Juniper Networks
Solutions
Products & Services
Company
Partners
Support
Education

Signature Detail

Security Intelligence Center
Signatures
Print

This site is deprecated. Please CLICK HERE for latest updates

Short Name

HTTP:CTS:FUSIONPBX-EXECPHP-CI

Severity

Major

Recommended

Yes

Recommended Action

Drop

Category

HTTP

Keywords

FusionPBX Operator Panel exec.php Command Injection

Release Date

2020/01/16

Update Number

3244

Supported Platforms

idp-4.0+, isg-3.0+, j-series-9.5+, mx-11.4+, srx-12.1+, srx-branch-12.1+, vmx-17.4+, vsrx-12.1+, vsrx3bsd-18.2+

HTTP: FusionPBX Operator Panel exec.php Command Injection


This signature detects attempts to exploit a known vulnerability against FusionPBX Web Application. A successful attack can lead to command injection and arbitrary code execution.

Extended Description

app/operator_panel/exec.php in the Operator Panel module in FusionPBX 4.4.3 suffers from a command injection vulnerability due to a lack of input validation that allows authenticated non-administrative attackers to execute commands on the host. This can further lead to remote code execution when combined with an XSS vulnerability also present in the FusionPBX Operator Panel module.

Affected Products

  • Fusionpbx fusionpbx 4.4.3

References

  • CVE: CVE-2019-11409

Site Map
RSS Feeds
Careers
Accessibility
Feedback
Privacy Policy
Legal Notices
Copyright © 1999-2010 Juniper Networks, Inc. All rights reserved.
Help
|
My Account
|
Log Out