The config restore function of Voipmonitor GUI before v24.96 does not properly check files sent as restore archives, allowing remote attackers to execute arbitrary commands via a crafted file in the web root.
References
| Link | Resource |
|---|---|
| https://kerbit.io/research/read/blog/3 | Exploit Third Party Advisory |
| https://www.voipmonitor.org/changelog-gui?major=5 | Release Notes Vendor Advisory |
| https://kerbit.io/research/read/blog/3 | Exploit Third Party Advisory |
| https://www.voipmonitor.org/changelog-gui?major=5 | Release Notes Vendor Advisory |
Configurations
History
21 Nov 2024, 06:50
| Type | Values Removed | Values Added |
|---|---|---|
| References | () https://kerbit.io/research/read/blog/3 - Exploit, Third Party Advisory | |
| References | () https://www.voipmonitor.org/changelog-gui?major=5 - Release Notes, Vendor Advisory |
Information
Published : 2022-02-04 17:15
Updated : 2024-11-21 06:50
NVD link : CVE-2022-24262
Mitre link : CVE-2022-24262
CVE.ORG link : CVE-2022-24262
JSON object : View
Products Affected
voipmonitor
- voipmonitor
CWE
CWE-434
Unrestricted Upload of File with Dangerous Type
