First published: Thu Jun 20 2019(Updated: )
An issue was discovered in FreePBX core before 3.0.122.43, 14.0.18.34, and 5.0.1beta4. By crafting a request for adding Asterisk modules, an attacker is able to store JavaScript commands in a module name.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Freepbx Freepbx | =15.0.1 | |
Sangoma FreePBX | <13.0.122.43 | |
Sangoma FreePBX | >=14.0.0<14.0.18.34 | |
Sangoma FreePBX | >=15.0.0<=15.0.1 | |
Sangoma FreePBX | =15.0.1-beta4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2018-15891 is medium, with a severity value of 4.8.
CVE-2018-15891 affects FreePBX versions 3.0.122.43, 14.0.18.34, and 5.0.1beta4.
An attacker can exploit CVE-2018-15891 by crafting a request for adding Asterisk modules and storing JavaScript commands in a module name.
Yes, there is a fix for CVE-2018-15891. It is recommended to upgrade FreePBX to version 3.0.122.43, 14.0.18.34, or 5.0.1beta4.
You can find more information about CVE-2018-15891 on the FreePBX Wiki and FreePBX website.