First published: Tue Apr 24 2007(Updated: )
Multiple cross-site scripting (XSS) vulnerabilities in freePBX 2.2.x allow remote attackers to inject arbitrary web script or HTML via the (1) From, (2) To, (3) Call-ID, (4) User-Agent, and unspecified other SIP protocol fields, which are stored in /var/log/asterisk/full and displayed by admin/modules/logfiles/asterisk-full-log.php.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
BSD | ||
HPE HP-UX | ||
Compaq Tru64 | ||
IBM AIX | ||
Linux Kernel | ||
SCO UNIX | ||
Oracle Solaris and Zettabyte File System (ZFS) | ||
FreePBX | =2.2.1 | |
FreePBX | =2.2_rc1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2007-2191 is a medium severity vulnerability due to multiple cross-site scripting (XSS) vulnerabilities in freePBX 2.2.x.
To fix CVE-2007-2191, upgrade to a patched version of freePBX that addresses the XSS vulnerabilities.
CVE-2007-2191 affects freePBX versions 2.2.x, specifically versions up to 2.2.1.
The potential impacts of CVE-2007-2191 include unauthorized script execution, which could lead to data theft or session hijacking.
Yes, CVE-2007-2191 can be exploited remotely, allowing attackers to inject arbitrary web scripts via specific SIP protocol fields.