Exploit Report

Computer Security And Bug Information

CVE-2024-37569

CVECVE-2024-37569
CVE Title
Published Date2024-06-09T20:15Z
Modified Date2024-06-12T16:32Z
CWE TypeCWE-77
CVSS 3.xCVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
DescriptionAn issue was discovered on Mitel 6869i through 4.5.0.41 and 5.x through 5.0.0.1018 devices. A command injection vulnerability exists in the hostname parameter taken in by the provis.html endpoint. The provis.html endpoint performs no sanitization on the hostname parameter (sent by an authenticated user), which is subsequently written to disk. During boot, the hostname parameter is executed as part of a series of shell commands. Attackers can achieve remote code execution in the root context by placing shell metacharacters in the hostname parameter.
References
By clicking these links you will leave this website. We do not endorse and will not be held accountable for any activity on external sites.
Reference URLhttps://github.com/kwburns/CVE/tree/main/Mitel/5.0.0.1018#authenticated-remote-command-execution-provis
Reference Description https://github.com/kwburns/CVE/tree/main/Mitel/5.0.0.1018#authenticated-remote-command-execution-provis
Reference URLhttps://github.com/kwburns/CVE/blob/main/Mitel/5.0.0.1018/code/exploit-provis.py
Reference Description https://github.com/kwburns/CVE/blob/main/Mitel/5.0.0.1018/code/exploit-provis.py
Reference URLhttps://www.youtube.com/watch?v=I9TQqfP5qzM
Reference Description https://www.youtube.com/watch?v=I9TQqfP5qzM
TagsExploit Third Party Advisory
Sources NIST MITRE

This site's data is aggregated programmatically and provided "as is" without any representations or warranties, express or implied. Exploit.report is not affiliated with the The MITRE Corporation, U.S. Department of Homeland Security (DHS), Cybersecurity and Infrastructure Security Agency (CISA), or US government in any way. CVE and the CVE logo are registered trademarks of The MITRE Corporation

© 2022 Exploit.Report | Data | Contact | Privacy Policy | Articles