vendor:
FusionPBX
by:
Dustin Cobb
9.8
CVSS
HIGH
Command Injection RCE via XSS
78
CWE
Product Name: FusionPBX
Affected Version From: <= 4.4.3
Affected Version To: <= 4.4.3
Patch Exists: YES
Related CWE: CVE-2019-11408 (XSS) AND CVE-2019-11409 (Command Injection RCE)
CPE: a:fusionpbx:fusionpbx
Metasploit:
N/A
Other Scripts:
N/A
Platforms Tested: Debian 8.11
2019
FusionPBX <= 4.4.3 Command Injection RCE via XSS
FusionPBX is vulnerable to Command Injection RCE via XSS. An attacker can encode an XSS payload that will be injected into the “Caller ID Number” field, or “User” component of the SIP “From” URI. Then, the attacker can connect to external SIP profile port and send a SIP INVITE packet with XSS payload injected into the From Field. The XSS payload will fire operator panel screen (CVE-2019-11408), which is designed to be monitored constantly by a call center operator. Once XSS code executes, a call is made to the exec.php script (CVE-2019-11409) with a reverse shell payload that connects back to a netcat listener on the attacker system.
Mitigation:
The vendor has released a patch to address this vulnerability. Users should upgrade to the latest version of FusionPBX.