Summary
An arbitrary file upload vulnerability exists in the FreePBX Endpoint Management module affecting the fwbrand parameter. Additionally the parameter allows an attacker to change the file path. Combined these can result in a webshell being uploaded.
Authentication with a known username is required.
Mitigations
- Update to the latest fixed version of the
endpoint module.
- Protect your ACP from suspicious users.
- Remove users that should not have access.
- Firewall your FreePBX ACP HTTP/HTTPS/GraphQL ports.
Scoring
CVSS 4.0 Base vector string: CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:L/SC:N/SI:N/SA:N
CVSS 4.0 more complete vector string: CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:L/SC:N/SI:N/SA:N/E:U/AU:N/R:U/V:D/RE:L/U:Green
Current CVSS v4.0 Base score is 8.6 (High)
Current CVSS v4.0 more complete score is 6.1 (Medium)
Alternative CVSS v4.1 score is 0.9 (Low)
See details on scoring on the FreePBX blog at https://www.freepbx.org/watch-what-we-do-with-security-fixes-%f0%9f%91%80/
Summary
An arbitrary file upload vulnerability exists in the FreePBX Endpoint Management module affecting the
fwbrandparameter. Additionally the parameter allows an attacker to change the file path. Combined these can result in a webshell being uploaded.Authentication with a known username is required.
Mitigations
endpointmodule.Scoring
CVSS 4.0 Base vector string:
CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:L/SC:N/SI:N/SA:NCVSS 4.0 more complete vector string:
CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:L/SC:N/SI:N/SA:N/E:U/AU:N/R:U/V:D/RE:L/U:GreenCurrent CVSS v4.0 Base score is 8.6 (High)
Current CVSS v4.0 more complete score is 6.1 (Medium)
Alternative CVSS v4.1 score is 0.9 (Low)
See details on scoring on the FreePBX blog at https://www.freepbx.org/watch-what-we-do-with-security-fixes-%f0%9f%91%80/