Vulnerability Description
The callme_startcall function in recordings/misc/callme_page.php in FreePBX 2.9, 2.10, and earlier allows remote attackers to execute arbitrary commands via the callmenum parameter in a c action.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Sangoma | Freepbx | <= 2.10 |
Related Weaknesses (CWE)
References
- http://packetstormsecurity.org/files/111028/FreePBX-2.10.0-Remote-Command-Execut
- http://seclists.org/fulldisclosure/2012/Mar/234
- http://secunia.com/advisories/48463Vendor Advisory
- http://www.exploit-db.com/exploits/18649Exploit
- http://www.exploit-db.com/exploits/18659
- http://www.freepbx.org/trac/ticket/5711Vendor Advisory
- http://www.securityfocus.com/bid/52630Exploit
- https://exchange.xforce.ibmcloud.com/vulnerabilities/74174
- http://packetstormsecurity.org/files/111028/FreePBX-2.10.0-Remote-Command-Execut
- http://seclists.org/fulldisclosure/2012/Mar/234
- http://secunia.com/advisories/48463Vendor Advisory
- http://www.exploit-db.com/exploits/18649Exploit
- http://www.exploit-db.com/exploits/18659
- http://www.freepbx.org/trac/ticket/5711Vendor Advisory
- http://www.securityfocus.com/bid/52630Exploit
FAQ
What is CVE-2012-4869?
CVE-2012-4869 is a vulnerability with a CVSS score of 7.5 (HIGH). The callme_startcall function in recordings/misc/callme_page.php in FreePBX 2.9, 2.10, and earlier allows remote attackers to execute arbitrary commands via the callmenum parameter in a c action.
How severe is CVE-2012-4869?
CVE-2012-4869 has been rated HIGH with a CVSS base score of 7.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2012-4869?
Check the references section above for vendor advisories and patch information. Affected products include: Sangoma Freepbx.