Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-m8m4-mgvv-fcv9

Опубликовано: 24 мая 2022
Источник: github
Github: Не прошло ревью

Описание

app/call_centers/cmd.php in the Call Center Queue Module in FusionPBX up to 4.5.7 suffers from a command injection vulnerability due to a lack of input validation, which allows authenticated attackers (with at least the permission call_center_queue_add or call_center_queue_edit) to execute any commands on the host as www-data.

app/call_centers/cmd.php in the Call Center Queue Module in FusionPBX up to 4.5.7 suffers from a command injection vulnerability due to a lack of input validation, which allows authenticated attackers (with at least the permission call_center_queue_add or call_center_queue_edit) to execute any commands on the host as www-data.

EPSS

Процентиль: 87%
0.03447
Низкий

Связанные уязвимости

CVSS3: 8.8
nvd
больше 6 лет назад

app/call_centers/cmd.php in the Call Center Queue Module in FusionPBX up to 4.5.7 suffers from a command injection vulnerability due to a lack of input validation, which allows authenticated attackers (with at least the permission call_center_queue_add or call_center_queue_edit) to execute any commands on the host as www-data.

EPSS

Процентиль: 87%
0.03447
Низкий