First published: Tue Jul 03 2012(Updated: )
Unrestricted file upload vulnerability in ImageUpload.ashx in the Wallboard application in Avaya IP Office Customer Call Reporter 7.0 before 7.0.5.8 Q1 2012 Maintenance Release and 8.0 before 8.0.9.13 Q1 2012 Maintenance Release allows remote attackers to execute arbitrary code by uploading an executable file and then accessing it via a direct request.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Avaya IP Office | =7.0 | |
Avaya IP Office | =8.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2012-3811 is classified as a high severity vulnerability due to its potential for remote code execution.
To mitigate CVE-2012-3811, update the Avaya IP Office Customer Call Reporter to version 7.0.5.8 or later, or 8.0.9.13 or later.
CVE-2012-3811 can facilitate remote attackers to upload arbitrary files, potentially leading to remote code execution.
CVE-2012-3811 affects Avaya IP Office Customer Call Reporter versions 7.0 before 7.0.5.8 and 8.0 before 8.0.9.13.
There are no specific workarounds for CVE-2012-3811; the recommended action is to apply the necessary updates as soon as possible.