CVE-2019-15029
HIGHFusionpbx - OS Command Injection
Title source: ruleDescription
FusionPBX 4.4.8 allows an attacker to execute arbitrary system commands by submitting a malicious command to the service_edit.php file (which will insert the malicious command into the database). To trigger the command, one needs to call the services.php file via a GET request with the service id followed by the parameter a=start to execute the stored command.
Exploits (2)
References (3)
Scores
CVSS v3
8.8
EPSS
0.2112
EPSS Percentile
95.7%
Attack Vector
NETWORK
CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Details
CWE
CWE-78
Status
published
Products (1)
fusionpbx/fusionpbx
4.4.8
Published
Sep 05, 2019
Tracked Since
Feb 18, 2026