Vulnerability Details : CVE-2014-1903
Public exploit exists!
admin/libraries/view.functions.php in FreePBX 2.9 before 2.9.0.14, 2.10 before 2.10.1.15, 2.11 before 2.11.0.23, and 12 before 12.0.1alpha22 does not restrict the set of functions accessible to the API handler, which allows remote attackers to execute arbitrary PHP code via the function and args parameters to admin/config.php.
Products affected by CVE-2014-1903
- cpe:2.3:a:freepbx:freepbx:2.11:*:*:*:*:*:*:*
- cpe:2.3:a:freepbx:freepbx:2.10:*:*:*:*:*:*:*
- cpe:2.3:a:freepbx:freepbx:2.12:*:*:*:*:*:*:*
- cpe:2.3:a:sangoma:freepbx:2.9:*:*:*:*:*:*:*
Threat overview for CVE-2014-1903
Top countries where our scanners detected CVE-2014-1903
Top open port discovered on systems with this issue
5060
IPs affected by CVE-2014-1903 1,178
Threat actors abusing to this issue?
Yes
Find out if you* are
affected by CVE-2014-1903!
*Directly or indirectly through your vendors, service providers and 3rd parties.
Powered by
attack surface intelligence
from SecurityScorecard.
Exploit prediction scoring system (EPSS) score for CVE-2014-1903
83.71%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 99 %
Percentile, the proportion of vulnerabilities that are scored at or less
Metasploit modules for CVE-2014-1903
-
FreePBX config.php Remote Code Execution
Disclosure Date: 2014-03-21First seen: 2020-04-26exploit/unix/webapp/freepbx_config_execThis module exploits a vulnerability found in FreePBX version 2.9, 2.10, and 2.11. It's possible to inject arbitrary PHP functions and commands in the "/admin/config.php" parameters "function" and "args". Authors: - i-Hmx - 0x00string - xistence <xistence@0x90.n
CVSS scores for CVE-2014-1903
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
7.5
|
HIGH | AV:N/AC:L/Au:N/C:P/I:P/A:P |
10.0
|
6.4
|
NIST |
CWE ids for CVE-2014-1903
-
Assigned by: nvd@nist.gov (Primary)
References for CVE-2014-1903
-
http://osvdb.org/103240
-
http://issues.freepbx.org/browse/FREEPBX-7117
Log in - Sangoma Issue TrackerVendor Advisory
-
http://issues.freepbx.org/browse/FREEPBX-7123
[FREEPBX-7123] Exec shell on a host using bug in config.php - Sangoma Issue TrackerVendor Advisory
-
http://code.freepbx.org/changelog/FreePBX_Framework?cs=a29382efeb293ef4f42aa9b841dfc8eabb2d1e03
-
http://www.freepbx.org/news/2014-02-06/security-vulnerability-notice
Page not found - FreePBX
-
http://archives.neohapsis.com/archives/fulldisclosure/2014-02/0111.html
-
https://github.com/0x00string/oldays/blob/master/CVE-2014-1903.pl
oldays/CVE-2014-1903.pl at master · 0x00string/oldays · GitHub
-
http://code.freepbx.org/changelog/FreePBX_SVN?cs=16429
-
http://archives.neohapsis.com/archives/fulldisclosure/2014-02/0097.html
-
http://packetstormsecurity.com/files/125166/FreePBX-2.x-Code-Execution.html
FreePBX 2.x Code Execution ≈ Packet Storm
-
http://www.securityfocus.com/archive/1/531040/100/0/threaded
SecurityFocus
-
http://packetstormsecurity.com/files/125215/FreePBX-2.9-Remote-Code-Execution.html
FreePBX 2.9 Remote Code Execution ≈ Packet Storm
Jump to