Description
The Sangoma Session Border Controller (SBC) 2.3.23-119 GA web interface is vulnerable to Argument Injection via special characters in the username field. Upon successful exploitation, a remote unauthenticated user can create a local system user with sudo privileges, and use that user to login to the system (either via the web interface or via SSH) to achieve complete compromise of the device. This affects /var/webconfig/gui/Webconfig.inc.php and /usr/local/sng/bin/sng-user-mgmt.
Published: 2019-10-22
Score: 9.8 Critical
EPSS: 3.3% Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

No analysis available yet.

Remediation

No remediation available yet.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2019-3797 The Sangoma Session Border Controller (SBC) 2.3.23-119 GA web interface is vulnerable to Argument Injection via special characters in the username field. Upon successful exploitation, a remote unauthenticated user can create a local system user with sudo privileges, and use that user to login to the system (either via the web interface or via SSH) to achieve complete compromise of the device. This affects /var/webconfig/gui/Webconfig.inc.php and /usr/local/sng/bin/sng-user-mgmt.
History

No history.

Subscriptions

Sangoma Session Border Controller Session Border Controller Firmware
cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2024-08-04T23:10:30.624Z

Reserved: 2019-05-16T00:00:00.000Z

Link: CVE-2019-12147

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2019-10-22T16:15:10.707

Modified: 2024-11-21T04:22:18.700

Link: CVE-2019-12147

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses