First published: Mon Jul 28 2014(Updated: )
Multiple directory traversal vulnerabilities in Fonality trixbox allow remote attackers to read arbitrary files via a .. (dot dot) in the lang parameter to (1) home/index.php, (2) asterisk_info/asterisk_info.php, (3) repo/repo.php, or (4) endpointcfg/endpointcfg.php in maint/modules/.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Trixbox |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2014-5111 is considered a critical vulnerability due to its potential for unauthorized access to sensitive files.
The vulnerability can be mitigated by updating trixbox to the latest version and implementing proper input validation to prevent directory traversal.
CVE-2014-5111 can allow remote attackers to read arbitrary files on the server, leading to potential data exposure.
CVE-2014-5111 affects multiple components including home/index.php, asterisk_info/asterisk_info.php, repo/repo.php, and endpointcfg/endpointcfg.php.
Any user or organization utilizing affected versions of the trixbox software is at risk from CVE-2014-5111.