Lucene search

K
osvGoogleOSV:CVE-2024-3798
HistoryJul 10, 2024 - 12:15 p.m.

CVE-2024-3798

2024-07-1012:15:09
Google
osv.dev
1
phoniebox
remote attack
shell command execution
reflected xss
cross-site request forgery
vulnerability
open-source project

CVSS4

8.7

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

PASSIVE

CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:H/SC:L/VI:H/SI:L/VA:H/SA:L

AI Score

5.7

Confidence

High

EPSS

0.001

Percentile

16.6%

Insecure handling of GET header parameter file included in requests being sent to an instance of the open-source project Phoniebox allows an attacker to create a website, which – when visited by a user – will send malicious requests to multiple hosts on the local network. If such a request reaches the server, it will cause one of the following (depending on the chosen payload): shell command execution, reflected XSS or cross-site request forgery.

This issue affects Phoniebox in all releases through 2.7. Newer 2.x releases were not tested, but they might also be vulnerable. 
Phoniebox in version 3.0 and higher are not affected.

CVSS4

8.7

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

PASSIVE

CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:H/SC:L/VI:H/SI:L/VA:H/SA:L

AI Score

5.7

Confidence

High

EPSS

0.001

Percentile

16.6%

Related for OSV:CVE-2024-3798