FreePBX /recordings/index.php 'ari_auth' Cookie Authentication Bypass

critical Nessus Plugin ID 81182

Synopsis

The remote web server hosts a PHP application that is affected by an authentication bypass vulnerability.

Description

The version of FreePBX hosted on the remote web server is affected by an authentication bypass vulnerability in the FreePBX ARI Framework module / Asterisk Recording Interface (ARI). A remote, unauthenticated attacker can exploit this issue to gain full administrator access to the FreePBX server by using a crafted request via the 'ari_auth' HTTP cookie. Consequently, the attacker can then execute arbitrary code on the remote host.

Solution

Refer to the referenced URL for vendor supplied instructions.

See Also

http://www.nessus.org/u?0fed603e

https://issues.freepbx.org/browse/FREEPBX-8070

Plugin Details

Severity: Critical

ID: 81182

File Name: freepbx_recordings_auth_bypass.nasl

Version: 1.10

Type: remote

Family: CGI abuses

Published: 2/5/2015

Updated: 6/5/2024

Configuration: Enable thorough checks

Supported Sensors: Nessus

Enable CGI Scanning: true

Risk Information

VPR

Risk Factor: Medium

Score: 6.7

CVSS v2

Risk Factor: Critical

Base Score: 10

Temporal Score: 7.8

Vector: CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C

Vulnerability Information

CPE: cpe:/a:freepbx:freepbx

Required KB Items: www/PHP, installed_sw/FreePBX

Excluded KB Items: Settings/disable_cgi_scanning

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 9/30/2014

Vulnerability Publication Date: 9/30/2014

Reference Information

CVE: CVE-2014-7235

BID: 70188