First published: Fri Dec 06 2019(Updated: )
In userman 13.0.76.43 through 15.0.20 in Sangoma FreePBX, XSS exists in the user management screen of the Administrator web site, i.e., the/admin/config.php?display=userman URI. An attacker with sufficient privileges can edit the Display Name of a user and embed malicious XSS code. When another user (such as an admin) visits the main User Management screen, the XSS payload will render and execute in the context of the victim user's account.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Sangoma FreePBX | >=13.0<=13.0.76.43 | |
Sangoma FreePBX | >=14.0<=14.0.7 | |
Sangoma FreePBX | >=15.0<=15.0.20 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID is CVE-2019-19552.
The severity level of CVE-2019-19552 is medium.
The XSS vulnerability in Sangoma FreePBX occurs in the user management screen of the Administrator web site when an attacker with sufficient privileges can edit the Display Name of a user and embed malicious XSS code.
The affected software versions of Sangoma FreePBX are 13.0.76.43 through 15.0.20.
The XSS vulnerability in Sangoma FreePBX can be exploited by an attacker with sufficient privileges who can edit the Display Name of a user and embed malicious XSS code.