First published: Mon Oct 21 2019(Updated: )
app/call_centers/cmd.php in the Call Center Queue Module in FusionPBX up to 4.5.7 suffers from a command injection vulnerability due to a lack of input validation, which allows authenticated attackers (with at least the permission call_center_queue_add or call_center_queue_edit) to execute any commands on the host as www-data.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Fusionpbx Fusionpbx | <=4.5.7 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-16964 has a medium severity level due to the potential for authenticated command injection attacks.
CVE-2019-16964 affects authenticated users of FusionPBX up to version 4.5.7 with specific permissions.
To fix CVE-2019-16964, upgrade to FusionPBX version 4.5.8 or later where the vulnerability is patched.
CVE-2019-16964 is a command injection vulnerability caused by insufficient input validation.
CVE-2019-16964 requires authenticated access, so it cannot be exploited remotely without valid credentials.