First published: Wed Mar 14 2018(Updated: )
A vulnerability in the conferencing component of Mitel Connect ONSITE, versions R1711-PREM and earlier, and Mitel ST 14.2, release GA28 and earlier, could allow an unauthenticated attacker to copy a malicious script into a newly generated PHP file and then execute the generated file using specially crafted requests. Successful exploit could allow an attacker to execute arbitrary code within the context of the application.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Mitel Connect ONSITE | <=r1711-prem | |
Mitel St14.2 | <=ga28 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-5779 is categorized as a critical vulnerability due to the potential for unauthenticated remote code execution.
To fix CVE-2018-5779, update Mitel Connect ONSITE to version R1712-PREM or later, and Mitel ST 14.2 to a version beyond GA28.
CVE-2018-5779 affects Mitel Connect ONSITE versions R1711-PREM and earlier, as well as Mitel ST 14.2 versions GA28 and earlier.
An attacker exploiting CVE-2018-5779 could copy a malicious script to a PHP file and execute it on the server, leading to potential data compromise.
No, CVE-2018-5779 can be exploited by an unauthenticated attacker.