First published: Wed Mar 14 2018(Updated: )
A vulnerability in the conferencing component of Mitel Connect ONSITE, versions R1711-PREM and earlier, and Mitel ST 14.2, release GA28 and earlier, could allow an unauthenticated attacker to inject PHP code using specially crafted requests to the vsethost.php page. Successful exploit could allow an attacker to execute arbitrary PHP code within the context of the application.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Mitel Connect ONSITE | <=r1711-prem | |
Mitel St14.2 | <=ga28 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-5782 is considered high severity due to the potential for unauthenticated remote code execution.
To fix CVE-2018-5782, upgrade Mitel Connect ONSITE to version later than R1711-PREM or Mitel ST 14.2 to a version higher than GA28.
CVE-2018-5782 affects users of Mitel Connect ONSITE versions R1711-PREM and earlier, as well as Mitel ST 14.2 release GA28 and earlier.
CVE-2018-5782 allows an unauthenticated attacker to inject PHP code via specially crafted requests.
Exploitation of CVE-2018-5782 could lead to full compromise of the affected Mitel system, allowing attackers to execute arbitrary code.