7.5
CVSSv2

CVE-2014-1903

Published: 18/02/2014 Updated: 10/12/2019
CVSS v2 Base Score: 7.5 | Impact Score: 6.4 | Exploitability Score: 10
VMScore: 760
Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Summary

admin/libraries/view.functions.php in FreePBX 2.9 prior to 2.9.0.14, 2.10 prior to 2.10.1.15, 2.11 prior to 2.11.0.23, and 12 prior to 12.0.1alpha22 does not restrict the set of functions accessible to the API handler, which allows remote malicious users to execute arbitrary PHP code via the function and args parameters to admin/config.php.

Vulnerable Product Search on Vulmon Subscribe to Product

freepbx freepbx 2.11

freepbx freepbx 2.10

sangoma freepbx 2.9

freepbx freepbx 2.12

Exploits

## # This module requires Metasploit: http//metasploitcom/download # Current source: githubcom/rapid7/metasploit-framework ## require 'msf/core' class Metasploit3 < Msf::Exploit::Remote Rank = ExcellentRanking include Msf::Exploit::Remote::HttpClient def initialize(info={}) super(update_info(info, 'Name' = ...
#!/usr/bin/perl use strict; use warnings; use IO::Socket::INET; # Exploit Title: FreePBX 29,210,211,12 Remote Command Execution # Google Dork: n/a # Date: 2/25/14 # Exploit Author: @0x00string # Vendor Homepage: wwwfreepbxorg/ # Software Link: mirrorfreepbxorg/freepbx-2110targz # Version: 211 tested working # Tested on: U ...