CVE-2018-14907
https://notcve.org/view.php?id=CVE-2018-14907
The Web server in 3CX version 15.5.8801.3 is vulnerable to Information Leakage, because of improper error handling in Stack traces, as demonstrated by discovering a full pathname. El servidor web en 3CX 15.5.8801.3 es vulnerable a una fuga de información, debido al manejo de errores incorrecto en las trazas de pila, tal y como queda demostrado con el descubrimiento de un nombre de ruta completo. • https://medium.com/stolabs/security-issues-on-3cx-web-service-d9dc7f1bea79 • CWE-209: Generation of Error Message Containing Sensitive Information •
CVE-2018-12426 – WP Live Chat Support Pro <= 8.0.06 - Remote Code Execution via unrestricted file upload
https://notcve.org/view.php?id=CVE-2018-12426
The WP Live Chat Support Pro plugin before 8.0.07 for WordPress is vulnerable to unauthenticated Remote Code Execution due to client-side validation of allowed file types, as demonstrated by a v1/remote_upload request with a .php filename and the image/jpeg content type. El plugin WP Live Chat Support Pro en versiones anteriores a la 8.0.07 para WordPress es vulnerable a la ejecución remota de código no autenticado debido a la validación del lado del cliente de los tipos de archivo permitidos. Esto queda demostrado por una petición v1/remote_upload con un nombre de archivo .php y el tipo de contenido image/jpeg. • https://github.com/CodeCabin/wp-live-chat-support/blob/master/readme.txt https://github.com/RiieCco/write-ups/tree/master/CVE-2018-12426 https://wpvulndb.com/vulnerabilities/9697 • CWE-434: Unrestricted Upload of File with Dangerous Type •
CVE-2018-11105 – 3CX Live Chat <= 8.0.07 - Cross-Site Scripting
https://notcve.org/view.php?id=CVE-2018-11105
There is stored cross site scripting in the wp-live-chat-support plugin before 8.0.08 for WordPress via the "name" (aka wplc_name) and "email" (aka wplc_email) input fields to wp-json/wp_live_chat_support/v1/start_chat whenever a malicious attacker would initiate a new chat with an administrator. NOTE: this issue exists because of an incomplete fix for CVE-2018-9864. Hay Cross-Site Scripting (XSS) persistente en el plugin wp-live-chat-support en versiones anteriores a la 8.0.08 para WordPress mediante los campos de entrada "name" (wplc_name) y "email" (wplc_email) en wp-json/wp_live_chat_support/v1/start_chat cuando un atacante malicioso inicie una nueva conversación con un administrador. NOTA: este problema existe debido a una solución incompleta para CVE-2018-9864. • https://github.com/RiieCco/write-ups/tree/master/CVE-2018-11105 https://wordpress.org/plugins/wp-live-chat-support/#developers • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •
CVE-2018-9864 – WP Live Chat Support <= 8.0.05 - Stored Cross-Site Scripting
https://notcve.org/view.php?id=CVE-2018-9864
The WP Live Chat Support plugin before 8.0.06 for WordPress has stored XSS via the Name field. El plugin WP Live Chat Support en versiones anteriores a la 8.0.06 para WordPress tiene XSS mediante el campo Name. • https://wordpress.org/plugins/wp-live-chat-support/#developers https://www.gubello.me/blog/wp-live-chat-support-8-0-05-stored-xss https://www.youtube.com/watch?v=eHG1pWaez9w • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •
CVE-2018-7654
https://notcve.org/view.php?id=CVE-2018-7654
On 3CX 15.5.6354.2 devices, the parameter "file" in the request "/api/RecordingList/download?file=" allows full access to files on the server via path traversal. En dispositivos 3CX 15.5.6354.2, el parámetro "file" en la petición "/api/RecordingList/download?file=" permite el acceso total a archivos en el servidor mediante el salto de directorio. • http://www.rootlabs.com.br/path-traversal-in-3cx https://medium.com/stolabs/path-traversal-in-3cx-7421a8ffdb7a • CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') •