6.8
CVSSv2

CVE-2008-6825

Published: 05/06/2009 Updated: 29/09/2017
CVSS v2 Base Score: 6.8 | Impact Score: 6.4 | Exploitability Score: 8.6
VMScore: 695
Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P

Vulnerability Summary

Directory traversal vulnerability in user/index.php in Fonality trixbox CE 2.6.1 and previous versions allows remote malicious users to include and execute arbitrary files via a .. (dot dot) in the langChoice parameter.

Vulnerable Product Search on Vulmon Subscribe to Product

trixbox trixbox 2.0

trixbox trixbox 2.4.2.0

trixbox trixbox

Exploits

#!/usr/bin/perl -w # Jean-Michel BESNARD <jmbesnard@gmailcom> / LEXSI Audit # 2008-07-09 # This is an update of the previous exploit We can now get a root shell, thanks to sudo # # perl trixbox_fi_v2pl 1921681212 # Please listen carefully as our menu option has changed # Choose from the following options: # 1> Remote TCP shell ...
## # $Id: trixbox_langchoicerb 11516 2011-01-08 01:13:26Z jduck $ ## ## # This file is part of the Metasploit Framework and may be subject to # redistribution and commercial restrictions Please see the Metasploit # Framework web site for more information on licensing and terms of use # metasploitcom/framework/ ## # -*- coding: utf-8 -* ...
#!/usr/bin/python # TrixBox 261 langChoice remote root exploit # muts from offensive-securitycom # All credits to Jean-Michel BESNARD <jmbesnard@gmailcom> # Same same, but different # wwwoffensive-securitycom/0day/trixboxpytxt ################################################################################################## # ...