CVE-2017-14535 Scanner
Detects 'Command Injection' vulnerability in trixbox affects v. 2.8.0.4.
Short Info
Level
High
Single Scan
Single Scan
Can be used by
Asset Owner
Estimated Time
10 seconds
Time Interval
30 days
Scan only one
Domain, IPv4, Subdomain
Toolbox
-
Trixbox is an open-source telephony application platform that allows users to manage and control their phone systems. This powerful tool offers features such as voice over IP, call routing, and messaging, making it an essential asset for businesses worldwide. However, while Trixbox is widely recognized for its functionality, it happens to be vulnerable to several security issues, one of them being the CVE-2017-14535.
CVE-2017-14535 is a serious vulnerability that can grant attackers with unauthorized access to the Trixbox system. This vulnerability occurs due to an OS command injection flaw via shell metacharacters in the lang parameter to /maint/modules/home/index.php.
When this vulnerability is exploited, attackers can execute any code they desire, allowing them to inject malware, alter files, or even take full control over the Trixbox system. As a result, the attacker can gain access to sensitive business data stored in the system and use it for malicious purposes, potentially creating a significant threat to the organization.
At S4E, we understand the importance of keeping your digital assets secure. Our platform provides you with cutting-edge technology to identify vulnerabilities and threats, enabling you to keep your systems safe and protected. With S4E, you can get ahead of the curve and stay one step ahead of your adversaries. So, start your journey with us today, and safeguard your digital assets with ease.
REFERENCES
- http://packetstormsecurity.com/files/162854/Trixbox-2.8.0.4-Remote-Code-Execution.html
- http://www.securityfocus.com/bid/103004
- https://secur1tyadvisory.wordpress.com/2018/02/11/trixbox-os-command-injection-vulnerability-cve-2017-14535/
- https://twitter.com/tiger_tigerboy/status/962689803270500352
- https://www.linkedin.com/pulse/trixbox-os-command-injection-vulnerability-sachin-wagh-ceh-ecsa-/?published=t