First published: Mon Oct 21 2019(Updated: )
In FusionPBX up to v4.5.7, the file app\call_broadcast\call_broadcast_edit.php uses an unsanitized "id" variable coming from the URL in an unparameterized SQL query, leading to SQL injection.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Fusionpbx Fusionpbx | <=4.5.7 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-16980 has a medium severity level due to its potential for SQL injection vulnerabilities.
To fix CVE-2019-16980, it is recommended to upgrade FusionPBX to version 4.5.8 or later where the vulnerability has been addressed.
The impact of CVE-2019-16980 allows an attacker to execute arbitrary SQL commands on the database, leading to data compromise.
CVE-2019-16980 affects FusionPBX versions up to and including 4.5.7.
Yes, CVE-2019-16980 can be easily exploited by sending specially crafted requests due to the lack of input sanitation.