First published: Thu May 28 2009(Updated: )
Multiple cross-site request forgery (CSRF) vulnerabilities in FreePBX 2.5.1, and other 2.4.x, 2.5.x, and pre-release 2.6.x versions, allow remote attackers to hijack the authentication of admins for requests that create a new admin account or have unspecified other impact.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
FreePBX | =2.4 | |
FreePBX | =2.4.0_beta1 | |
FreePBX | =2.4.0_beta2 | |
FreePBX | =2.4.1 | |
FreePBX | =2.5 | |
FreePBX | =2.5.0_beta1 | |
FreePBX | =2.5.0rc2 | |
FreePBX | =2.5.0rc3 | |
FreePBX | =2.5.1 | |
FreePBX | =2.5.2 | |
FreePBX | =2.4.0 | |
FreePBX | =2.5.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2009-1802 is a high-severity vulnerability due to its potential to allow unauthorized account creation and administrative actions.
To fix CVE-2009-1802, it is recommended to upgrade to the latest version of FreePBX that addresses these CSRF vulnerabilities.
CVE-2009-1802 affects FreePBX versions 2.4.x, 2.5.x, and 2.5.1, along with certain pre-release versions.
CVE-2009-1802 facilitates cross-site request forgery (CSRF) attacks that can hijack an admin's authentication.
Administrators using the vulnerable versions of FreePBX are at risk from CVE-2009-1802 due to the potential for unauthorized account manipulation.