Lucene search

K
saintSAINT CorporationSAINT:F762C7EE0C413C50523BEDBB950B3BF5
HistoryOct 22, 2012 - 12:00 a.m.

Avaya IP Office Customer Call Reporter ImageUpload.ashx file upload

2012-10-2200:00:00
SAINT Corporation
download.saintcorporation.com
9

CVSS2

10

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:C/I:C/A:C

EPSS

0.968

Percentile

99.7%

Added: 10/22/2012
CVE: CVE-2012-3811
BID: 54225
OSVDB: 83399

Background

Avaya IP Office is a unified communications solution for mobile workforce.

Problem

The ImageUpload.ashx script allows unauthenticated users to upload arbitrary script files to the webserver. The script files can then be executed by a web request, leading to arbitrary command execution.

Resolution

Apply one of the fixes referenced in ASA-2012-222.

References

<http://www.zerodayinitiative.com/advisories/ZDI-12-106/&gt;

Limitations

Exploit works on Avaya IP Office Customer Call Reporter 8.0.8.15.

Platforms

Windows

CVSS2

10

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:C/I:C/A:C

EPSS

0.968

Percentile

99.7%