CVE-2020-7351
HIGHNetfortris Trixbox < 2.8.0.4 - OS Command Injection
Title source: ruleDescription
An OS Command Injection vulnerability in the endpoint_devicemap.php component of Fonality Trixbox Community Edition allows an attacker to execute commands on the underlying operating system as the "asterisk" user. Note that Trixbox Community Edition has been unsupported by the vendor since 2012. This issue affects: Fonality Trixbox Community Edition, versions 1.2.0 through 2.8.0.4. Versions 1.0 and 1.1 are unaffected.
Exploits (1)
metasploit
WORKING POC
EXCELLENT
by Anastasios Stasinopoulos (@ancst) · rubypoclinux
https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/unix/webapp/trixbox_ce_endpoint_devicemap_rce.rb
Scores
CVSS v3
7.3
EPSS
0.6886
EPSS Percentile
98.6%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:N
Details
CWE
CWE-78
Status
published
Products (1)
netfortris/trixbox
1.2.0 - 2.8.0.4
Published
May 01, 2020
Tracked Since
Feb 18, 2026