First published: Tue Apr 28 2020(Updated: )
An OS Command Injection vulnerability in the endpoint_devicemap.php component of Fonality Trixbox Community Edition allows an attacker to execute commands on the underlying operating system as the "asterisk" user. Note that Trixbox Community Edition has been unsupported by the vendor since 2012. This issue affects: Fonality Trixbox Community Edition, versions 1.2.0 through 2.8.0.4. Versions 1.0 and 1.1 are unaffected.
Credit: cve@rapid7.con
Affected Software | Affected Version | How to fix |
---|---|---|
Trixbox | >=1.2.0<=2.8.0.4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-7351 has a high severity rating due to its potential for OS command injection and system exploitation.
To mitigate CVE-2020-7351, it is recommended to upgrade to a supported version of the software or apply security patches if available.
CVE-2020-7351 affects Fonality Trixbox Community Edition versions from 1.2.0 to 2.8.0.4.
Yes, CVE-2020-7351 can be exploited remotely by an attacker to execute commands on the system.
No, Fonality Trixbox Community Edition is no longer supported by the vendor, increasing the risks associated with CVE-2020-7351.