Executive Summary



This vulnerability is currently undergoing analysis and not all information is available. Please check back soon to view the completed vulnerability summary
Informations
NameCVE-2018-19911First vendor Publication2018-12-06
VendorCveLast vendor Modification2018-12-06

Security-Database Scoring CVSS v2

Cvss vector :
Cvss Base ScoreNot DefinedAttack RangeNot Defined
Cvss Impact ScoreNot DefinedAttack ComplexityNot Defined
Cvss Expoit ScoreNot DefinedAuthenticationNot Defined
Calculate full CVSS 2.0 Vectors scores

Detail

FreeSWITCH through 1.8.2, when mod_xml_rpc is enabled, allows remote attackers to execute arbitrary commands via the api/system or txtapi/system (or api/bg_system or txtapi/bg_system) query string on TCP port 8080, as demonstrated by an api/system?calc URI. This can also be exploited via CSRF. Alternatively, the default password of works for the freeswitch account can sometimes be used.

Original Source

Url : http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19911

Sources (Detail)

SourceUrl
MISC https://github.com/iSafeBlue/freeswitch_rce/blob/master/freeswitch_rce.py
https://github.com/iSafeBlue/freeswitch_rce/blob/master/README-en.md

Alert History

If you want to see full details history, please login or register.
0
DateInformations
2018-12-06 21:19:30
  • First insertion