Summary
FreePBX module cdr (Call Data Record) is vulnerable to SQL query injection.
Authentication with a known username is required.
Details
There is insufficient input sanitization of some LIMIT parameters in certain SQL queries, including Line 696 of page.cdr.php and Line 702 of page.cdr.php. Both UNION-based and Time-Based Blind injections are covered by this issue.
Impact
This issue allows user-controlled input to be used directly in SQL queries without proper sanitization. An attacker who can access the affected functionality could potentially exploit this to view and/or manipulate data directly within the database.
Mitigations
- Update the
cdr module to the latest version.
- Ensure only authorized users have access to the FreePBX Administrator Control Panel e.g. by using the FreePBX User Management, SysAdmin VPN, MFA or SAML modules.
- Deny access from hostile networks to the ACP e.g. by using the FreePBX Firewall module.
Scoring
CVSS 4.0 Base vector string: CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
CVSS 4.0 Base Threat Environment Supplemental vector string: CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/R:U/V:D/RE:L/U:Amber
Current CVSS-B v4.0 score: 8.6 (High)
Current CVSS-BTES v4.0 score: 6.1 (Medium)
Alternative CVSS-BTES v4.1 score: 0.9 (Low)
See details on scoring on the FreePBX blog at https://www.freepbx.org/watch-what-we-do-with-security-fixes-%f0%9f%91%80/
History
This vulnerability was introduced in 2011, at the dawn of the module's inclusion in FreePBX 🧓🏽 and accordingly attains an Amber alert in the Provider Urgency supplemental metric.
https://github.com/FreePBX/cdr/blame/a04b3eb1e4606ea2df75565af313270d4d57fd39/page.cdr.php#L375
Summary
FreePBX module cdr (Call Data Record) is vulnerable to SQL query injection.
Authentication with a known username is required.
Details
There is insufficient input sanitization of some LIMIT parameters in certain SQL queries, including Line 696 of page.cdr.php and Line 702 of page.cdr.php. Both UNION-based and Time-Based Blind injections are covered by this issue.
Impact
This issue allows user-controlled input to be used directly in SQL queries without proper sanitization. An attacker who can access the affected functionality could potentially exploit this to view and/or manipulate data directly within the database.
Mitigations
cdrmodule to the latest version.Scoring
CVSS 4.0 Base vector string:
CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:NCVSS 4.0 Base Threat Environment Supplemental vector string:
CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/R:U/V:D/RE:L/U:AmberCurrent CVSS-B v4.0 score: 8.6 (High)
Current CVSS-BTES v4.0 score: 6.1 (Medium)
Alternative CVSS-BTES v4.1 score: 0.9 (Low)
See details on scoring on the FreePBX blog at https://www.freepbx.org/watch-what-we-do-with-security-fixes-%f0%9f%91%80/
History
This vulnerability was introduced in 2011, at the dawn of the module's inclusion in FreePBX 🧓🏽 and accordingly attains an Amber alert in the Provider Urgency supplemental metric.
https://github.com/FreePBX/cdr/blame/a04b3eb1e4606ea2df75565af313270d4d57fd39/page.cdr.php#L375