← Volver a CVEs
CVE-2024-37569
HIGH8.8
Descripcion
An issue was discovered on Mitel 6869i through 4.5.0.41 and 5.x through 5.0.0.1018 devices. A command injection vulnerability exists in the hostname parameter taken in by the provis.html endpoint. The provis.html endpoint performs no sanitization on the hostname parameter (sent by an authenticated user), which is subsequently written to disk. During boot, the hostname parameter is executed as part of a series of shell commands. Attackers can achieve remote code execution in the root context by placing shell metacharacters in the hostname parameter.
Detalles CVE
Puntuacion CVSS v3.18.8
SeveridadHIGH
Vector CVSSCVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Vector de ataqueNETWORK
ComplejidadLOW
Privilegios requeridosLOW
Interaccion usuarioNONE
Publicado6/9/2024
Ultima modificacion11/21/2024
Fuentenvd
Avistamientos honeypot0
Productos afectados
mitel:6869i_sipmitel:6869i_sip_firmware
Debilidades (CWE)
CWE-77CWE-77
Referencias
https://github.com/kwburns/CVE/tree/main/Mitel/5.0.0.1018#authenticated-remote-command-execution-provis(cve@mitre.org)
https://www.youtube.com/watch?v=I9TQqfP5qzM(cve@mitre.org)
https://github.com/kwburns/CVE/blob/main/Mitel/5.0.0.1018/code/exploit-provis.py(af854a3a-2127-422b-91ae-364da2661108)
https://github.com/kwburns/CVE/tree/main/Mitel/5.0.0.1018#authenticated-remote-command-execution-provis(af854a3a-2127-422b-91ae-364da2661108)
https://www.youtube.com/watch?v=I9TQqfP5qzM(af854a3a-2127-422b-91ae-364da2661108)
Correlaciones IOC
Sin correlaciones registradas
This product uses data from the NVD API but is not endorsed or certified by the NVD.