FusionPBX XSS 18

An attacker targeting an authenticated user can push him to click on a URL of FusionPBX 4.5.7 specially crafted to get javascript code executed in his browser.

In FusionPBX up to v4.5.7, file app\basic_operator_panel\resources\content.php uses an unsanitized “eavesdrop_dest” variable coming from the URL which is reflected on 3 occasions in HTML leading to XSS.

 

Bug ID: https://www.fusionpbx.com/app/tickets/ticket_edit.php?id=15d02f7a-3dc0-441a-ac70-e09f95817004
Fix: https://github.com/fusionpbx/fusionpbx/commit/7fec1014ff0d08e36be6a3f7664edb3a9df7b4ac

Issue was reported by Pierre Jourdan on 10/08/2019 and fixed on same day by Mark J Crane.

 

CVE published, NVD base score is 6.1 MEDIUM:
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16988
https://nvd.nist.gov/vuln/detail/CVE-2019-16988

Leave a comment