CVE-2017-14535 Scanner

Detects 'Command Injection' vulnerability in trixbox affects v. 2.8.0.4.

Short Info


Level

High

Single Scan

Single Scan

Can be used by

Asset Owner

Estimated Time

10 seconds

Time Interval

30 days

Scan only one

Domain, IPv4, Subdomain

Toolbox

-

Trixbox is an open-source telephony application platform that allows users to manage and control their phone systems. This powerful tool offers features such as voice over IP, call routing, and messaging, making it an essential asset for businesses worldwide. However, while Trixbox is widely recognized for its functionality, it happens to be vulnerable to several security issues, one of them being the CVE-2017-14535.

CVE-2017-14535 is a serious vulnerability that can grant attackers with unauthorized access to the Trixbox system. This vulnerability occurs due to an OS command injection flaw via shell metacharacters in the lang parameter to /maint/modules/home/index.php.

When this vulnerability is exploited, attackers can execute any code they desire, allowing them to inject malware, alter files, or even take full control over the Trixbox system. As a result, the attacker can gain access to sensitive business data stored in the system and use it for malicious purposes, potentially creating a significant threat to the organization.

At S4E, we understand the importance of keeping your digital assets secure. Our platform provides you with cutting-edge technology to identify vulnerabilities and threats, enabling you to keep your systems safe and protected. With S4E, you can get ahead of the curve and stay one step ahead of your adversaries. So, start your journey with us today, and safeguard your digital assets with ease.

 

REFERENCES

Get started to protecting your Free Full Security Scan