FusionPBX version 4.5.29 suffers from a remote code execution vulnerability.
0609444f39b9d7b9c9397d2d88ed1c8e1ea3a11f729fab5d87031e6c9f650bd4
This Metasploit module exploits an authenticated command injection vulnerability in FusionPBX versions 4.4.3 and prior. The exec.php file within the Operator Panel permits users with operator_panel_view permissions, or administrator permissions, to execute arbitrary commands as the web server user by sending a system command to the FreeSWITCH event socket interface. This module has been tested successfully on FusionPBX version 4.4.1 on Ubuntu 19.04 (x64).
38468e6614fd2cb8667101b151bf487ee43e93ccd419b6ad4216f21cee042b1e
This Metasploit module uses administrative functionality available in FusionPBX to gain a shell. The Command section of the application permits users with exec_view permissions, or superadmin permissions, to execute arbitrary system commands, or arbitrary PHP code, as the web server user. This module has been tested successfully on FusionPBX version 4.4.1 on Ubuntu 19.04 (x64).
9ddc511633ca4524be66e468aa2349e7ebf43ba65883baed79761e3c37b3b7af
FusionPBX version 4.4.8 remote code execution exploit.
3f9ccb9b6a54502ec081f485fb044474a5a2fa76fa573edbcbb6734679ef0eb3
FusionPBX versions 4.4.3 and below suffer from a remote code execution vulnerability via cross site scripting.
2116c72ea7f7eb6337234a9d1cddbfc94c56900a0a24c8146f1617c1a0139fca