Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

nvd логотип

CVE-2019-15029

Опубликовано: 05 сент. 2019
Источник: nvd
CVSS3: 8.8
CVSS2: 9
EPSS Средний

Описание

FusionPBX 4.4.8 allows an attacker to execute arbitrary system commands by submitting a malicious command to the service_edit.php file (which will insert the malicious command into the database). To trigger the command, one needs to call the services.php file via a GET request with the service id followed by the parameter a=start to execute the stored command.

Уязвимые конфигурации

Конфигурация 1
cpe:2.3:a:fusionpbx:fusionpbx:4.4.8:*:*:*:*:*:*:*

EPSS

Процентиль: 96%
0.21116
Средний

8.8 High

CVSS3

9 Critical

CVSS2

Дефекты

CWE-78

Связанные уязвимости

github
больше 3 лет назад

FusionPBX 4.4.8 allows an attacker to execute arbitrary system commands by submitting a malicious command to the service_edit.php file (which will insert the malicious command into the database). To trigger the command, one needs to call the services.php file via a GET request with the service id followed by the parameter a=start to execute the stored command.

EPSS

Процентиль: 96%
0.21116
Средний

8.8 High

CVSS3

9 Critical

CVSS2

Дефекты

CWE-78