vendor:
TrixBox
by:
Muts from Offensive-Security.com
9.3
CVSS
HIGH
Remote Code Execution
94
CWE
Product Name: TrixBox
Affected Version From: 2.6.2001
Affected Version To: 2.6.2001
Patch Exists: YES
Related CWE: N/A
CPE: a:trixbox:trixbox:2.6.1
Metasploit:
N/A
Other Scripts:
N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References:
N/A
Nuclei Metadata: N/A
Platforms Tested: Linux
2008
TrixBox 2.6.1 langChoice remote root exploit
This exploit is a remote code execution vulnerability in TrixBox 2.6.1. It allows an attacker to inject malicious code into the session file, which is then executed by the server. This exploit was discovered by Jean-Michel BESNARD and published by Offensive Security. It requires the attacker to have access to the target server and the ability to send crafted HTTP requests.
Mitigation:
The best way to mitigate this vulnerability is to upgrade to a newer version of TrixBox that is not affected by this exploit.