890
VMScore

CVE-2018-5782

Published: 14/03/2018 Updated: 26/04/2019
CVSS v2 Base Score: 10 | Impact Score: 10 | Exploitability Score: 10
CVSS v3 Base Score: 9.8 | Impact Score: 5.9 | Exploitability Score: 3.9
VMScore: 890
Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C

Vulnerability Summary

A vulnerability in the conferencing component of Mitel Connect ONSITE, versions R1711-PREM and previous versions, and Mitel ST 14.2, release GA28 and previous versions, could allow an unauthenticated malicious user to inject PHP code using specially crafted requests to the vsethost.php page. Successful exploit could allow an malicious user to execute arbitrary PHP code within the context of the application.

Vulnerable Product Search on Vulmon Subscribe to Product

mitel st14.2

mitel connect onsite

Exploits

ShoreTel / Mitel Connect ONSITE ST142 suffers from a remote code execution vulnerability ...

Github Repositories

Remote Code Execution on ShoreTel/Mitel CONNECT Onsite ST 14.2

ShoreTel / Mitel Remote Code Execution Issue Explanation There are multiple vulnerabilities in ShoreTel/Mitel Connect ONSITE ST 142 which, when chained together, result in remote code execution Usage Example Not sure this is really needed but I’ll include it anyway # /shoretel_rcerb domaincom/ "cat /etc/passwd" root:x:0:0:root:/root:/bin/bash bin:x