Lucene search

K
osvGoogleOSV:CVE-2024-3799
HistoryJul 10, 2024 - 12:15 p.m.

CVE-2024-3799

2024-07-1012:15:10
Google
osv.dev
5
phoniebox
post parameter
shell command execution
local network attack
cve-2024-3799

CVSS4

8.7

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

PASSIVE

CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:H/SC:N/VI:H/SI:N/VA:H/SA:N

AI Score

6.2

Confidence

Low

EPSS

0.001

Percentile

16.6%

Insecure handling of POST header parameter body included in requests being sent to an instance of the open-source project Phoniebox allows an attacker to create a website, which – when visited by a user – will send malicious requests to multiple hosts on the local network. If such a request reaches the server, it will cause a shell command execution.

This issue affects Phoniebox in all releases through 2.7. Newer 2.x releases were not tested, but they might also be vulnerable.
Phoniebox in version 3.0 and higher are not affected.

CVSS4

8.7

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

PASSIVE

CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:H/SC:N/VI:H/SI:N/VA:H/SA:N

AI Score

6.2

Confidence

Low

EPSS

0.001

Percentile

16.6%

Related for OSV:CVE-2024-3799