First published: Fri Feb 16 2018(Updated: )
trixbox 2.8.0.4 has OS command injection via shell metacharacters in the lang parameter to /maint/modules/home/index.php.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Trixbox | =2.8.0.4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2017-14535 is classified as a high-severity vulnerability due to its ability to enable OS command injection.
To fix CVE-2017-14535, you should update Trixbox to the latest version or apply any available patches that address this vulnerability.
Exploitation of CVE-2017-14535 can lead to unauthorized command execution on the affected Trixbox system.
The vulnerability affects users of Trixbox version 2.8.0.4 specifically.
CVE-2017-14535 can be exploited by manipulating the 'lang' parameter in the /maint/modules/home/index.php file with shell metacharacters.