First published: Tue Dec 27 2022(Updated: )
A vulnerability was found in FreeBPX voicemail. It has been rated as problematic. Affected by this issue is some unknown functionality of the file views/ssettings.php of the component Settings Handler. The manipulation of the argument key leads to cross site scripting. The attack may be launched remotely. Upgrading to version 14.0.6.25 is able to address this issue. The name of the patch is ffce4882016076acd16fe0f676246905aa3cb2f3. It is recommended to upgrade the affected component. The identifier of this vulnerability is VDB-216872.
Credit: cna@vuldb.com cna@vuldb.com
Affected Software | Affected Version | How to fix |
---|---|---|
Sangoma Voicemail | <14.0.6.25 | |
<14.0.6.25 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-4283 is a vulnerability found in FreeBPX voicemail that allows for cross-site scripting attacks.
The severity of CVE-2021-4283 is rated as medium, with a severity value of 5.4.
Sangoma Voicemail version 14.0.6.25 is affected by CVE-2021-4283.
To fix CVE-2021-4283, you should update to the latest version of Sangoma Voicemail (release/14.0.6.25).
CVE-2021-4283 is associated with CWE-79, which refers to cross-site scripting (XSS) vulnerabilities.