Full Disclosure mailing list archives
Re: Freepbx , php code execution exploit
From: Rob Thomas <rob.thomas () schmoozecom com>
Date: Wed, 12 Feb 2014 10:05:06 +1000
simple one is included here just as a "knock knock" for the "schmoozecom" team ;)
[CVE-2014-1903] FreePBX 2.9 through 12 RCE Overview: Unauthenticated user-level Remote Code Execution (RCE) vulnerability in admin/config.php, the main interface to FreePBX. This bug was introduced in FreePBX 2.9, earlier versions are not affected. Score - 8.4 (AV:N/AC:L/Au:N/C:P/I:P/A:C/E:H/RL:OF/RC:C/CDP:MH/TD:ND/CR:L/IR:L/AR:M) Reference to Advisory: http://www.freepbx.org/news/2014-02-06/security-vulnerability-notice Reference to Bug: http://issues.freepbx.org/browse/FREEPBX-7123 Fixed in Versions: 2.9 -- 2.9.0.14 2.10 - 2.10.1.15 2.11 - 2.11.0.23 12 - 12.0.1alpha22 Additional Information: FreePBX contains an automatic alert service for upgrade notifications. If your system is set up correctly, you would have received an email alert of this vulnerability when it was detected and fixed. Schmoozecom strongly urges you to ensure that the email alert address is correct and up to date to ensure you receive notifications of security issues and pending updates. Schmoozecom and FreePBX are very proactive and responsive to security issues, and care deeply about the security of our software and systems. We welcome security related bug reports and issues, and they can be submitted via email to security () freepbx org for instant attention. _______________________________________________ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/
Current thread:
- Freepbx , php code execution exploit 0u7 5m4r7 (Feb 11)
- <Possible follow-ups>
- Re: Freepbx , php code execution exploit Rob Thomas (Feb 12)
