SQL Injection vulnerability in admin interface (/vicidial/admin.php) of VICIdial via modify_email_accounts, access_recordings, and agentcall_email parameters allows attacker to spoof identity, tamper with existing data, allow the complete disclosure of all data on the system, destroy the data or make it otherwise unavailable, and become administrators of the database server. This issue affects: VICIdial 2.14b0.5 versions prior to 3555.
References
Link | Resource |
---|---|
https://github.com/rapid7/metasploit-framework/pull/16732 | Patch Third Party Advisory |
https://www.vicidial.org/VICIDIALforum/viewtopic.php?f=4&t=41300&sid=aacb27a29fefd85265b4d55fe51122af | Vendor Advisory |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: rapid7
Published: 2022-06-30T00:00:00
Updated: 2022-07-05T15:40:15
Reserved: 2022-06-30T00:00:00
Link: CVE-2022-34876
JSON object: View
NVD Information
Status : Analyzed
Published: 2022-07-05T16:15:08.033
Modified: 2022-07-13T17:30:43.463
Link: CVE-2022-34876
JSON object: View
Redhat Information
No data.
CWE