9
CVSSv2

CVE-2017-16251

Published: 13/03/2018 Updated: 07/09/2018
CVSS v2 Base Score: 9 | Impact Score: 10 | Exploitability Score: 8
CVSS v3 Base Score: 8.8 | Impact Score: 5.9 | Exploitability Score: 2.8
VMScore: 801
Vector: AV:N/AC:L/Au:S/C:C/I:C/A:C

Vulnerability Summary

A vulnerability in the conferencing component of Mitel ST 14.2, release GA28 and previous versions, could allow an authenticated user to upload a malicious script to the Personal Library by a crafted POST request. Successful exploit could allow an malicious user to execute arbitrary code within the context of the application.

Vulnerable Product Search on Vulmon Subscribe to Product

mitel st14.2

Github Repositories

Remote Code Execution on ShoreTel/Mitel CONNECT Onsite ST 14.2

ShoreTel / Mitel Remote Code Execution Issue Explanation There are multiple vulnerabilities in ShoreTel/Mitel Connect ONSITE ST 142 which, when chained together, result in remote code execution Usage Example Not sure this is really needed but I’ll include it anyway # /shoretel_rcerb domaincom/ "cat /etc/passwd" root:x:0:0:root:/root:/bin/bash bin:x