8.8
CVSSv3

CVE-2019-15029

Published: 05/09/2019 Updated: 24/08/2020
CVSS v2 Base Score: 9 | Impact Score: 10 | Exploitability Score: 8
CVSS v3 Base Score: 8.8 | Impact Score: 5.9 | Exploitability Score: 2.8
VMScore: 801
Vector: AV:N/AC:L/Au:S/C:C/I:C/A:C

Vulnerability Summary

FusionPBX 4.4.8 allows an malicious user to execute arbitrary system commands by submitting a malicious command to the service_edit.php file (which will insert the malicious command into the database). To trigger the command, one needs to call the services.php file via a GET request with the service id followed by the parameter a=start to execute the stored command.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

fusionpbx fusionpbx 4.4.8

Github Repositories

The official exploit code for FusionPBX v4.4.8 Remote Code Execution CVE-2019-15029

CVE-2019-15029 The official exploit code for FusionPBX v448 Remote Code Execution CVE-2019-15029 Metasploit Module I wrote a simple Metasploit module to exploit this issue fusionpbx_servicesrb, you just have to download it and copy it into metasploit modules directory