Vulnerability Description
A vulnerability in the conferencing component of Mitel Connect ONSITE, versions R1711-PREM and earlier, and Mitel ST 14.2, release GA28 and earlier, could allow an unauthenticated attacker to copy a malicious script into a newly generated PHP file and then execute the generated file using specially crafted requests. Successful exploit could allow an attacker to execute arbitrary code within the context of the application.
CVSS Score
CRITICAL
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Mitel | Connect Onsite | <= r1711-prem |
| Mitel | St14.2 | <= ga28 |
Related Weaknesses (CWE)
References
- https://www.mitel.com/support/security-advisories/mitel-product-security-advisor
- https://www.mitel.com/support/security-advisories/mitel-product-security-advisor
FAQ
What is CVE-2018-5779?
CVE-2018-5779 is a vulnerability with a CVSS score of 9.8 (CRITICAL). A vulnerability in the conferencing component of Mitel Connect ONSITE, versions R1711-PREM and earlier, and Mitel ST 14.2, release GA28 and earlier, could allow an unauthenticated attacker to copy a m...
How severe is CVE-2018-5779?
CVE-2018-5779 has been rated CRITICAL with a CVSS base score of 9.8/10. This is considered a critical vulnerability requiring immediate attention.
Is there a patch for CVE-2018-5779?
Check the references section above for vendor advisories and patch information. Affected products include: Mitel Connect Onsite, Mitel St14.2.