First published: Tue Oct 22 2019(Updated: )
The Sangoma Session Border Controller (SBC) 2.3.23-119 GA web interface is vulnerable to Argument Injection via special characters in the username field. Upon successful exploitation, a remote unauthenticated user can create a local system user with sudo privileges, and use that user to login to the system (either via the web interface or via SSH) to achieve complete compromise of the device. This affects /var/webconfig/gui/Webconfig.inc.php and /usr/local/sng/bin/sng-user-mgmt.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Sangoma Session Border Controller Firmware | =2.3.23-119-ga | |
Sangoma Session Border Controller |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
Vulnerability CVE-2019-12147 refers to the Sangoma Session Border Controller (SBC) 2.3.23-119 GA web interface being vulnerable to Argument Injection via special characters in the username field.
The severity of vulnerability CVE-2019-12147 is critical with a severity value of 9.8.
A remote unauthenticated user can exploit vulnerability CVE-2019-12147 by creating a local system user with sudo privileges through successful exploitation of the argument injection vulnerability.
The affected software by vulnerability CVE-2019-12147 is Sangoma Session Border Controller (SBC) Firmware version 2.3.23-119 GA.
Yes, there are references available for vulnerability CVE-2019-12147. You can find them at: http://packetstormsecurity.com/files/154914/Sangoma-SBC-2.3.23-119-GA-Unauthenticated-User-Creation.html, http://seclists.org/fulldisclosure/2019/Oct/40, and https://blog.appsecco.com.