Multiple vulnerabilities in 3CX 6.0.806.0

2009-08-04 / 2009-08-05
Risk: High
Local: No
Remote: Yes

Synopsis: 3CX 6.0.806.0 is vulnerable to session hijacking, XSS, information disclosure and DoS. Background: "3CX Phone System for Windows is a software-based IP PBX that replaces traditional proprietary hardware PBX / PABX. 3CXs IP PBX has been developed specifically for Microsoft Windows and is based on the SIP standard making it easier to manage and allowing you to use any SIP phone (software or hardware)." Issue 1: By default 3CX does not run HTTPS allowing an attacker to sniff the administrators session ID and masquerade as the administrator and perform tasks on their behalf. Issue 2: XSS is possible in the fName and fPassword fields on the main login page for the console (login.php) Issue 3: If the drive in which 3CX is installed reaches 100% capacity the login.php page reveals the installation path to any user. Issue 4: Performing vulnerability scans (Nessus/SAINT) against a 3CX server causes the server to become unstable, crash and is non recoverable and must be reinstalled to use again. Time line: Discovered: August 5th 2008 Vendor notified: August 24th 2008 Vendor response: September 3rd, 2008 Vendor fix: November 2008 Chris Castaldo "An ounce of prevention is worth a pound of cure."

References:

http://xforce.iss.net/xforce/xfdb/47167
http://www.securityfocus.com/bid/32709
http://secunia.com/advisories/33060
http://osvdb.org/50599
http://marc.info/?l=full-disclosure&m=122868146707468&w=2


Vote for this issue:
50%
50%


 

Thanks for you vote!


 

Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.


(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2024, cxsecurity.com

 

Back to Top