CVE-2016-2363

Published on: 06/19/2016 12:00:00 AM UTC

Last Modified on: 03/23/2021 11:27:15 PM UTC

CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

Certain versions of Fonality from Fonality contain the following vulnerability:

Fonality (previously trixbox Pro) 12.6 through 14.1i before 2016-06-01 uses weak permissions for the /var/www/rpc/surun script, which allows local users to obtain root access for unspecified command execution by leveraging access to the nobody account.

  • CVE-2016-2363 has been assigned by [email protected] to track the vulnerability - currently rated as HIGH severity.

CVSS3 Score: 7.8 - HIGH

Attack
Vector
Attack
Complexity
Privileges
Required
User
Interaction
LOCAL LOW LOW NONE
Scope Confidentiality
Impact
Integrity
Impact
Availability
Impact
UNCHANGED HIGH HIGH HIGH

CVSS2 Score: 7.2 - HIGH

Access
Vector
Access
Complexity
Authentication
LOCAL LOW NONE
Confidentiality
Impact
Integrity
Impact
Availability
Impact
COMPLETE COMPLETE COMPLETE

CVE References

Description Tags Link
Vulnerability Note VU#754056 - Fonality contains a hard-coded password and embedded SSL private key Third Party Advisory
US Government Resource
www.kb.cert.org
text/html
URL Logo CERT-VN VU#754056

Known Affected Configurations (CPE V2.3)

Type Vendor Product Version Update Edition Language
ApplicationFonalityFonality12.6AllAllAll
ApplicationFonalityFonality12.8AllAllAll
ApplicationFonalityFonality14.1iAllAllAll
ApplicationFonalityFonality12.6AllAllAll
ApplicationFonalityFonality12.8AllAllAll
ApplicationFonalityFonality14.1iAllAllAll
  • cpe:2.3:a:fonality:fonality:12.6:*:*:*:*:*:*:*:
  • cpe:2.3:a:fonality:fonality:12.8:*:*:*:*:*:*:*:
  • cpe:2.3:a:fonality:fonality:14.1i:*:*:*:*:*:*:*:
  • cpe:2.3:a:fonality:fonality:12.6:*:*:*:*:*:*:*:
  • cpe:2.3:a:fonality:fonality:12.8:*:*:*:*:*:*:*:
  • cpe:2.3:a:fonality:fonality:14.1i:*:*:*:*:*:*:*: