Vulnerability Details CVE-2019-15029
FusionPBX 4.4.8 allows an attacker to execute arbitrary system commands by submitting a malicious command to the service_edit.php file (which will insert the malicious command into the database). To trigger the command, one needs to call the services.php file via a GET request with the service id followed by the parameter a=start to execute the stored command.
Exploit prediction scoring system (EPSS) score
EPSS Score 0.219
EPSS Ranking 95.5%
CVSS Severity
CVSS v3 Score 8.8
CVSS v2 Score 9.0
Products affected by CVE-2019-15029
-
cpe:2.3:a:fusionpbx:fusionpbx:4.4.8