An issue was discovered in the 3CX Phone System Management Console prior to version 18 Update 3 FINAL. An unauthenticated attacker could abuse improperly secured access to arbitrary files on the server (via /Electron/download directory traversal in conjunction with a path component that uses backslash characters), leading to cleartext credential disclosure. Afterwards, the authenticated attacker is able to upload a file that overwrites a 3CX service binary, leading to Remote Code Execution as NT AUTHORITY\SYSTEM on Windows installations. NOTE: this issue exists because of an incomplete fix for CVE-2022-48482.
References
Link | Resource |
---|---|
https://medium.com/%40frycos/pwning-3cx-phone-management-backends-from-the-internet-d0096339dd88 | |
https://www.3cx.com/blog/change-log/phone-system-change-log/ | Release Notes Vendor Advisory |
https://www.3cx.com/blog/releases/v18-security-hotfix/ | Release Notes Vendor Advisory |
https://www.3cx.com/blog/releases/v18-update-3-final/ | Release Notes Vendor Advisory |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: mitre
Published: 2022-05-06T00:00:00
Updated: 2023-05-02T00:00:00
Reserved: 2022-03-28T00:00:00
Link: CVE-2022-28005
JSON object: View
NVD Information
Status : Modified
Published: 2022-05-06T15:15:08.787
Modified: 2023-11-07T03:45:32.993
Link: CVE-2022-28005
JSON object: View
Redhat Information
No data.
CWE