CVE ID: CVE-2019-19615
Multiple XSS vulnerabilities have been discovered in the ‘Backup & Restore’ module for FreePBX 14.
CVSS v3.1 Details:
CVSS Base Score: 2.0
Impact Subscore: 1.4
Exploitability Subscore: 0.5
CVSS Temporal Score: 1.8
CVSS Environmental Score: 1.6
Modified Impact Subscore: 0.7
Overall CVSS Score: 1.6
Vulnerable software and versions:
The versions listed below (or less than)
backup v188.8.131.52 through v184.108.40.206
The following versions of fixes:
>= backup v220.127.116.11
Official Bug ticket: https://issues.freepbx.org/browse/FREEPBX-20551
Multiple XSS vulnerabilities exist in the Backup & Restore screen of the FreePBX Administrator web site. Eg. /admin/config.php?display=backup. An attacker can modify the id parameter of the backup configuration screen and embed malicious XSS code via link. When another user (such as an admin) clicks the link, the XSS payload will render and execute in the context of the victim user’s account.
The Sangoma and FreePBX team has deemed this a major security issue. We strongly encourage all users of FreePBX 14 to upgrade to the latest version of the userman module. This can be done from the Module Admin GUI or fwconsole. For more information on using Module Admin, please see http://wiki.freepbx.org/display/FPG/Module+Admin+User+Guide.
Sangoma takes security seriously and requests that any future FreePBX security issue be reported at firstname.lastname@example.org.