CVE-2018-6393

FreePBX 10.13.66-32bit and 14.0.1.24 (SNG7-PBX-64bit-1712-2) allow post-authentication SQL injection via the order parameter. NOTE: the vendor disputes this issue because it is intentional that a user can "directly modify SQL tables ... [or] run shell scripts ... once ... logged in to the administration interface; there is no need to try to find input validation errors.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:sangoma:freepbx:10.13.66:*:*:*:*:*:*:*
cpe:2.3:a:sangoma:freepbx:14.0.1.24:*:*:*:*:*:*:*

History

07 Nov 2023, 02:59

Type Values Removed Values Added
Summary ** DISPUTED ** FreePBX 10.13.66-32bit and 14.0.1.24 (SNG7-PBX-64bit-1712-2) allow post-authentication SQL injection via the order parameter. NOTE: the vendor disputes this issue because it is intentional that a user can "directly modify SQL tables ... [or] run shell scripts ... once ... logged in to the administration interface; there is no need to try to find input validation errors." FreePBX 10.13.66-32bit and 14.0.1.24 (SNG7-PBX-64bit-1712-2) allow post-authentication SQL injection via the order parameter. NOTE: the vendor disputes this issue because it is intentional that a user can "directly modify SQL tables ... [or] run shell scripts ... once ... logged in to the administration interface; there is no need to try to find input validation errors.

Information

Published : 2018-01-29 20:29

Updated : 2024-04-11 01:02


NVD link : CVE-2018-6393

Mitre link : CVE-2018-6393

CVE.ORG link : CVE-2018-6393


JSON object : View

Products Affected

sangoma

  • freepbx
CWE
CWE-89

Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')