CVE-2020-7351:OS Command Injection vulnerability in Fonality Trixbox CE allows remote command execution as "asterisk" user.

splash
Back

Description Preview

A critical OS Command Injection vulnerability (CWE-78) exists in the endpoint_devicemap.php component of Fonality Trixbox Community Edition. This vulnerability allows remote attackers to execute arbitrary system commands with the privileges of the "asterisk" user on the underlying operating system. The vulnerability affects Trixbox CE versions 1.2.0 through 2.8.0.4, while versions 1.0 and 1.1 are unaffected. It's important to note that Trixbox Community Edition has been unsupported by the vendor since 2012, making this vulnerability particularly concerning for organizations still using this legacy software.

Overview

The vulnerability in Trixbox CE allows attackers to inject malicious commands through the endpoint_devicemap.php component. Since the commands execute with the permissions of the "asterisk" user, attackers can potentially gain access to sensitive system information, modify configurations, or use the compromised system as a launching point for further attacks within the network. This vulnerability has been documented in public exploit repositories and has been incorporated into the Metasploit Framework, indicating its severity and the availability of exploitation tools. The fact that Trixbox CE has been unsupported since 2012 means that no official patches will be released, leaving systems permanently vulnerable unless migrated to supported alternatives.

Remediation

As Fonality Trixbox Community Edition has been unsupported since 2012, there are no official patches available for this vulnerability. Organizations still using Trixbox CE should consider the following remediation steps:

  1. Migrate to a supported VoIP/PBX solution as soon as possible.
  2. If immediate migration is not possible, implement network-level controls to restrict access to the vulnerable component:
    • Use firewalls to limit access to the Trixbox web interface
    • Implement network segmentation to isolate the Trixbox system
    • Consider deploying a web application firewall (WAF) to filter malicious requests
  3. Regularly monitor system logs for suspicious activities related to the "asterisk" user
  4. Ensure the "asterisk" user has minimal privileges on the system to reduce the impact of exploitation

References

  1. Packet Storm Security - TrixBox CE 2.8.0.4 Command Execution: http://packetstormsecurity.com/files/157565/TrixBox-CE-2.8.0.4-Command-Execution.html

  2. Metasploit Framework Pull Request (includes exploit code): https://github.com/rapid7/metasploit-framework/pull/13353

  3. Common Weakness Enumeration (CWE-78): OS Command Injection https://cwe.mitre.org/data/definitions/78.html

Industry ExposureMost to least
This section illustrates the prevalence of a specific Common Vulnerabilities and Exposures (CVE) across various industries based on customer reports. The ranking displays industries from the most to least affected by this particular vulnerability, offering valuable insight into where this CVE has been most frequently observed. This information can help organizations within these sectors prioritize their security efforts, understand their relative risk exposure compared to their peers, and focus remediation strategies where they are most needed. By understanding the industry-specific impact, organizations can make more informed decisions regarding patching, resource allocation, and overall risk management related to this CVE.

  1. Accommodation & Food Services
    Accommodation & Food Services
  2. Administrative, Support, Waste Management & Remediation Services
    Administrative, Support, Waste Management & Remediation Services
  3. Agriculture, Forestry Fishing & Hunting
    Agriculture, Forestry Fishing & Hunting
  4. Arts, Entertainment & Recreation
    Arts, Entertainment & Recreation
  5. Construction
    Construction
  6. Educational Services
    Educational Services
  7. Finance and Insurance
    Finance and Insurance
  8. Health Care & Social Assistance
    Health Care & Social Assistance
  9. Information
    Information
  10. Management of Companies & Enterprises
    Management of Companies & Enterprises
  11. Manufacturing
    Manufacturing
  12. Mining
    Mining
  13. Other Services (except Public Administration)
    Other Services (except Public Administration)
  14. Professional, Scientific, & Technical Services
    Professional, Scientific, & Technical Services
  15. Public Administration
    Public Administration
  16. Real Estate Rental & Leasing
    Real Estate Rental & Leasing
  17. Retail Trade
    Retail Trade
  18. Transportation & Warehousing
    Transportation & Warehousing
  19. Utilities
    Utilities
  20. Wholesale Trade
    Wholesale Trade

Focus on What Matters

  1. See Everything.
  2. Identify True Risk.
  3. Proactively Mitigate Threats.

Let's talk!

background