First published: Fri Dec 06 2019(Updated: )
In userman 13.0.76.43 through 15.0.20 in Sangoma FreePBX, XSS exists in the User Management screen of the Administrator web site. An attacker with access to the User Control Panel application can submit malicious values in some of the time/date formatting and time-zone fields. These fields are not being properly sanitized. If this is done and a user (such as an admin) visits the User Management screen and views that user's profile, the XSS payload will render and execute in the context of the victim user's account.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Sangoma FreePBX | >=13.0<=13.0.76.43 | |
Sangoma FreePBX | >=14.0<=14.0.7 | |
Sangoma FreePBX | >=15.0<=15.0.20 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this XSS vulnerability is CVE-2019-19551.
The affected software for this vulnerability is Sangoma FreePBX versions 13.0.76.43 through 15.0.20.
The severity of CVE-2019-19551 is medium with a CVSS score of 4.8.
An attacker with access to the User Control Panel application can submit malicious values in certain fields on the User Management screen to perform cross-site scripting (XSS) attacks.
Yes, Sangoma has released patches to address the XSS vulnerabilities in FreePBX. It is recommended to update to the latest version of Sangoma FreePBX to mitigate this vulnerability.