| ID |
CVE-2018-19911
|
| Sažetak |
FreeSWITCH through 1.8.2, when mod_xml_rpc is enabled, allows remote attackers to execute arbitrary commands via the api/system or txtapi/system (or api/bg_system or txtapi/bg_system) query string on TCP port 8080, as demonstrated by an api/system?calc URI. This can also be exploited via CSRF. Alternatively, the default password of works for the freeswitch account can sometimes be used. |
| Reference |
|
| CVSS |
| Base: | 7.6 |
| Impact: | 10.0 |
| Exploitability: | 4.9 |
|
| Pristup |
| Vektor | Složenost | Autentikacija |
| NETWORK |
HIGH |
NONE |
|
| Impact |
| Povjerljivost | Cjelovitost | Dostupnost |
| COMPLETE |
COMPLETE |
COMPLETE |
|
| CVSS vektor |
AV:N/AC:H/Au:N/C:C/I:C/A:C |
| Zadnje važnije ažuriranje |
24-08-2020 - 17:37 |
| Objavljeno |
06-12-2018 - 18:29 |