Lucene search

K
prionPRIOn knowledge basePRION:CVE-2019-15029
HistorySep 05, 2019 - 9:15 p.m.

Command injection

2019-09-0521:15:00
PRIOn knowledge base
www.prio-n.com
5

8.8 High

AI Score

Confidence

High

0.888 High

EPSS

Percentile

98.7%

FusionPBX 4.4.8 allows an attacker to execute arbitrary system commands by submitting a malicious command to the service_edit.php file (which will insert the malicious command into the database). To trigger the command, one needs to call the services.php file via a GET request with the service id followed by the parameter a=start to execute the stored command.

CPENameOperatorVersion
fusionpbxeq4.4.8

8.8 High

AI Score

Confidence

High

0.888 High

EPSS

Percentile

98.7%