Fusionpbx

Fusionpbx

52 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.33%
  • Veröffentlicht 21.10.2019 16:15:17
  • Zuletzt bearbeitet 21.11.2024 04:31:28

In FusionPBX up to v4.5.7, the file resources\paging.php has a paging function (called by several pages of the interface), which uses an unsanitized "param" variable constructed partially from the URL args and reflected in HTML, leading to XSS.

  • EPSS 0.33%
  • Veröffentlicht 21.10.2019 16:15:17
  • Zuletzt bearbeitet 21.11.2024 04:31:28

In FusionPBX up to v4.5.7, the file app\access_controls\access_control_nodes.php uses an unsanitized "id" variable coming from the URL, which is reflected in HTML, leading to XSS.

  • EPSS 0.33%
  • Veröffentlicht 21.10.2019 16:15:17
  • Zuletzt bearbeitet 21.11.2024 04:31:28

In FusionPBX up to v4.5.7, the file app\conference_profiles\conference_profile_params.php uses an unsanitized "id" variable coming from the URL, which is reflected on 2 occasions in HTML, leading to XSS.

  • EPSS 0.41%
  • Veröffentlicht 21.10.2019 15:15:10
  • Zuletzt bearbeitet 21.11.2024 04:31:29

In FusionPBX up to v4.5.7, the file app/music_on_hold/music_on_hold.php uses an unsanitized "file" variable coming from the URL, which takes any pathname (base64 encoded) and allows a download of it.

  • EPSS 0.29%
  • Veröffentlicht 21.10.2019 15:15:10
  • Zuletzt bearbeitet 21.11.2024 04:31:28

In FusionPBX up to v4.5.7, the file app\call_broadcast\call_broadcast_edit.php uses an unsanitized "id" variable coming from the URL in an unparameterized SQL query, leading to SQL injection.

  • EPSS 0.33%
  • Veröffentlicht 21.10.2019 15:15:10
  • Zuletzt bearbeitet 21.11.2024 04:31:28

In FusionPBX up to v4.5.7, the file app\contacts\contact_urls.php uses an unsanitized "id" variable coming from the URL, which is reflected in HTML, leading to XSS.

  • EPSS 0.33%
  • Veröffentlicht 21.10.2019 15:15:10
  • Zuletzt bearbeitet 21.11.2024 04:31:27

In FusionPBX up to v4.5.7, the file app\devices\device_settings.php uses an unsanitized "id" variable coming from the URL, which is reflected on 2 occasions in HTML, leading to XSS.

Exploit
  • EPSS 21.12%
  • Veröffentlicht 05.09.2019 21:15:31
  • Zuletzt bearbeitet 21.11.2024 04:27:54

FusionPBX 4.4.8 allows an attacker to execute arbitrary system commands by submitting a malicious command to the service_edit.php file (which will insert the malicious command into the database). To trigger the command, one needs to call the services...

  • EPSS 6.27%
  • Veröffentlicht 17.06.2019 19:15:11
  • Zuletzt bearbeitet 21.11.2024 04:21:03

app/backup/index.php in the Backup Module in FusionPBX 4.4.3 suffers from a command injection vulnerability due to a lack of input validation, which allows authenticated administrative attackers to execute commands on the host.

Exploit
  • EPSS 84.67%
  • Veröffentlicht 17.06.2019 19:15:11
  • Zuletzt bearbeitet 21.11.2024 04:21:03

app/operator_panel/exec.php in the Operator Panel module in FusionPBX 4.4.3 suffers from a command injection vulnerability due to a lack of input validation that allows authenticated non-administrative attackers to execute commands on the host. This ...