First published: Thu May 28 2009(Updated: )
FreePBX 2.5.1, and other 2.4.x, 2.5.x, and pre-release 2.6.x versions, generates different error messages for a failed login attempt depending on whether the user account exists, which allows remote attackers to enumerate valid usernames.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
FreePBX | =2.4 | |
FreePBX | =2.4.0_beta1 | |
FreePBX | =2.4.0_beta2 | |
FreePBX | =2.4.1 | |
FreePBX | =2.5 | |
FreePBX | =2.5.0_beta1 | |
FreePBX | =2.5.0rc2 | |
FreePBX | =2.5.0rc3 | |
FreePBX | =2.5.1 | |
FreePBX | =2.5.2 | |
FreePBX | =2.4.0 | |
FreePBX | =2.5.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2009-1803 is rated as a medium severity vulnerability due to its ability to allow username enumeration.
To fix CVE-2009-1803, update your FreePBX installation to a version that addresses this vulnerability.
CVE-2009-1803 affects FreePBX versions 2.4.x, 2.5.x, and pre-release 2.6.x, including version 2.5.1.
CVE-2009-1803 enables remote attackers to enumerate valid usernames through differing error messages.
A potential workaround for CVE-2009-1803 is to modify the error response mechanics, but updating to a patched version is recommended.