First published: Thu Sep 05 2019(Updated: )
FusionPBX 4.4.8 allows an attacker to execute arbitrary system commands by submitting a malicious command to the service_edit.php file (which will insert the malicious command into the database). To trigger the command, one needs to call the services.php file via a GET request with the service id followed by the parameter a=start to execute the stored command.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Fusionpbx Fusionpbx | =4.4.8 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-15029 has a high severity rating as it allows an attacker to execute arbitrary system commands.
To fix CVE-2019-15029, update FusionPBX to a version later than 4.4.8 that addresses this vulnerability.
CVE-2019-15029 affects FusionPBX version 4.4.8.
CVE-2019-15029 is a remote code execution vulnerability that allows arbitrary command execution.
Yes, CVE-2019-15029 can be exploited remotely by submitting a malicious command via a GET request.