First published: Tue Oct 07 2014(Updated: )
htdocs_ari/includes/login.php in the ARI Framework module/Asterisk Recording Interface (ARI) in FreePBX before 2.9.0.9, 2.10.x, and 2.11 before 2.11.1.5 allows remote attackers to execute arbitrary code via the ari_auth cookie, related to the PHP unserialize function, as exploited in the wild in September 2014.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
FreePBX | =2.10.0.0 | |
FreePBX | =2.10.0.1 | |
FreePBX | =2.10.0.2 | |
FreePBX | =2.10.0.3 | |
FreePBX | =2.10.0.4 | |
FreePBX | =2.10.0.5 | |
FreePBX | =2.10.0.6 | |
FreePBX | =2.10.0.7 | |
FreePBX | =2.10.0.8 | |
FreePBX | =2.10.0.9 | |
FreePBX | =2.10.0.10 | |
FreePBX | =2.11.1.0 | |
FreePBX | =2.11.1.1 | |
FreePBX | =2.11.1.2 | |
FreePBX | =2.11.1.3 | |
FreePBX | =2.11.1.4 | |
FreePBX | <=2.9.0.8 | |
FreePBX | =2.11.0.0 | |
FreePBX | =2.11.0.1 | |
FreePBX | =2.11.0.2 | |
FreePBX | =2.11.0.3 | |
FreePBX | =2.11.0.4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2014-7235 has been classified as a critical vulnerability due to its ability to allow remote attackers to execute arbitrary code.
To fix CVE-2014-7235, update FreePBX to versions 2.9.0.9 or higher, 2.10.x to at least 2.10.0.9, or 2.11 to at least 2.11.1.5.
CVE-2014-7235 can be exploited by attackers to execute arbitrary code remotely, potentially leading to system compromise.
All versions of FreePBX prior to 2.9.0.9, 2.10.x before 2.10.0.9, and 2.11 before 2.11.1.5 are affected by CVE-2014-7235.
Yes, CVE-2014-7235 has been exploited in the wild, emphasizing the urgency of applying patches.