Sangoma

Freepbx

24 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.35%
  • Veröffentlicht 06.12.2019 16:15:11
  • Zuletzt bearbeitet 21.11.2024 04:34:57

In userman 13.0.76.43 through 15.0.20 in Sangoma FreePBX, XSS exists in the User Management screen of the Administrator web site. An attacker with access to the User Control Panel application can submit malicious values in some of the time/date forma...

  • EPSS 2.14%
  • Veröffentlicht 21.11.2019 18:15:11
  • Zuletzt bearbeitet 21.11.2024 04:33:58

Sangoma FreePBX 115.0.16.26 and below, 14.0.13.11 and below, 13.0.197.13 and below have Incorrect Access Control.

Exploit
  • EPSS 0.4%
  • Veröffentlicht 21.10.2019 20:15:10
  • Zuletzt bearbeitet 21.11.2024 04:31:26

An issue was discovered in Manager 13.x before 13.0.2.6 and 15.x before 15.0.6 before FreePBX 14.0.10.3. In the Manager module form (html\admin\modules\manager\views\form.php), an unsanitized managerdisplay variable coming from the URL is reflected i...

  • EPSS 0.4%
  • Veröffentlicht 21.10.2019 19:15:11
  • Zuletzt bearbeitet 21.11.2024 04:31:26

An issue was discovered in Contactmanager 13.x before 13.0.45.3, 14.x before 14.0.5.12, and 15.x before 15.0.8.21 for FreePBX 14.0.10.3. In the Contactmanager class (html\admin\modules\contactmanager\Contactmanager.class.php), an unsanitized group va...

  • EPSS 0.41%
  • Veröffentlicht 20.06.2019 17:15:09
  • Zuletzt bearbeitet 21.11.2024 03:51:39

An issue was discovered in FreePBX core before 3.0.122.43, 14.0.18.34, and 5.0.1beta4. By crafting a request for adding Asterisk modules, an attacker is able to store JavaScript commands in a module name.

Exploit
  • EPSS 3.15%
  • Veröffentlicht 29.01.2018 20:29:00
  • Zuletzt bearbeitet 21.11.2024 04:10:37

FreePBX 10.13.66-32bit and 14.0.1.24 (SNG7-PBX-64bit-1712-2) allow post-authentication SQL injection via the order parameter. NOTE: the vendor disputes this issue because it is intentional that a user can "directly modify SQL tables ... [or] run shel...

  • EPSS 57.42%
  • Veröffentlicht 07.10.2014 14:55:09
  • Zuletzt bearbeitet 12.04.2025 10:46:40

htdocs_ari/includes/login.php in the ARI Framework module/Asterisk Recording Interface (ARI) in FreePBX before 2.9.0.9, 2.10.x, and 2.11 before 2.11.1.5 allows remote attackers to execute arbitrary code via the ari_auth cookie, related to the PHP uns...

  • EPSS 83.71%
  • Veröffentlicht 18.02.2014 11:55:16
  • Zuletzt bearbeitet 11.04.2025 00:51:21

admin/libraries/view.functions.php in FreePBX 2.9 before 2.9.0.14, 2.10 before 2.10.1.15, 2.11 before 2.11.0.23, and 12 before 12.0.1alpha22 does not restrict the set of functions accessible to the API handler, which allows remote attackers to execut...

Exploit
  • EPSS 7.98%
  • Veröffentlicht 06.09.2012 17:55:02
  • Zuletzt bearbeitet 11.04.2025 00:51:21

Multiple cross-site scripting (XSS) vulnerabilities in FreePBX 2.9 and earlier allow remote attackers to inject arbitrary web script or HTML via the (1) context parameter to panel/index_amp.php or (2) panel/dhtml/index.php; (3) clid or (4) clidname p...

Exploit
  • EPSS 84.87%
  • Veröffentlicht 06.09.2012 17:55:02
  • Zuletzt bearbeitet 11.04.2025 00:51:21

The callme_startcall function in recordings/misc/callme_page.php in FreePBX 2.9, 2.10, and earlier allows remote attackers to execute arbitrary commands via the callmenum parameter in a c action.