mirror of
https://github.com/0xMarcio/cve.git
synced 2025-12-16 20:27:21 +00:00
26 lines
1.1 KiB
Markdown
26 lines
1.1 KiB
Markdown
|
|
### [CVE-2012-4869](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4869)
|
||
|
|

|
||
|
|

|
||
|
|

|
||
|
|
|
||
|
|
### Description
|
||
|
|
|
||
|
|
The callme_startcall function in recordings/misc/callme_page.php in FreePBX 2.9, 2.10, and earlier allows remote attackers to execute arbitrary commands via the callmenum parameter in a c action.
|
||
|
|
|
||
|
|
### POC
|
||
|
|
|
||
|
|
#### Reference
|
||
|
|
- http://packetstormsecurity.org/files/111028/FreePBX-2.10.0-Remote-Command-Execution-XSS.html
|
||
|
|
- http://seclists.org/fulldisclosure/2012/Mar/234
|
||
|
|
- http://www.exploit-db.com/exploits/18649
|
||
|
|
|
||
|
|
#### Github
|
||
|
|
- https://github.com/0xConstant/CVE-2012-4869
|
||
|
|
- https://github.com/0xConstant/ExploitDevJourney
|
||
|
|
- https://github.com/0xkasra/CVE-2012-4869
|
||
|
|
- https://github.com/0xkasra/ExploitDevJourney
|
||
|
|
- https://github.com/AndyCyberSec/OSCP
|
||
|
|
- https://github.com/bitc0de/Elastix-Remote-Code-Execution
|
||
|
|
- https://github.com/macosta-42/Exploit-Development
|
||
|
|
|