Lucene search

K
cvelistRapid7CVELIST:CVE-2020-7351
HistoryApr 28, 2020 - 12:00 a.m.

CVE-2020-7351 Fonality Trixbox CE Post-Authentication Command Injection

2020-04-2800:00:00
CWE-78
rapid7
www.cve.org
7

CVSS3

7.3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:N

AI Score

9

Confidence

High

EPSS

0.918

Percentile

98.9%

An OS Command Injection vulnerability in the endpoint_devicemap.php component of Fonality Trixbox Community Edition allows an attacker to execute commands on the underlying operating system as the “asterisk” user. Note that Trixbox Community Edition has been unsupported by the vendor since 2012. This issue affects: Fonality Trixbox Community Edition, versions 1.2.0 through 2.8.0.4. Versions 1.0 and 1.1 are unaffected.

CNA Affected

[
  {
    "product": "Trixbox Community Edition",
    "vendor": "Fonality",
    "versions": [
      {
        "status": "unaffected",
        "version": "1.0"
      },
      {
        "status": "unaffected",
        "version": "1.1"
      },
      {
        "lessThanOrEqual": "2.8.0.4",
        "status": "affected",
        "version": "2.8.0.4",
        "versionType": "custom"
      }
    ]
  }
]

CVSS3

7.3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:N

AI Score

9

Confidence

High

EPSS

0.918

Percentile

98.9%