ID |
CVE-2018-19911
|
Sažetak |
FreeSWITCH through 1.8.2, when mod_xml_rpc is enabled, allows remote attackers to execute arbitrary commands via the api/system or txtapi/system (or api/bg_system or txtapi/bg_system) query string on TCP port 8080, as demonstrated by an api/system?calc URI. This can also be exploited via CSRF. Alternatively, the default password of works for the freeswitch account can sometimes be used. |
Reference |
|
CVSS |
Base: | 7.6 |
Impact: | 10.0 |
Exploitability: | 4.9 |
|
Pristup |
Vektor | Složenost | Autentikacija |
NETWORK |
HIGH |
NONE |
|
Impact |
Povjerljivost | Cjelovitost | Dostupnost |
COMPLETE |
COMPLETE |
COMPLETE |
|
CVSS vektor |
AV:N/AC:H/Au:N/C:C/I:C/A:C |
Zadnje važnije ažuriranje |
24-08-2020 - 17:37 |
Objavljeno |
06-12-2018 - 18:29 |