Security
Headlines
HeadlinesLatestCVEs

Headline

CVE-2019-16984: Update recording_play.php · fusionpbx/fusionpbx@11f2dd2

In FusionPBX up to v4.5.7, the file app\recordings\recording_play.php uses an unsanitized “filename” variable coming from the URL, which is base64 decoded and reflected in HTML, leading to XSS.

CVE
#xss#java#php

@@ -17,7 +17,7 @@

The Initial Developer of the Original Code is

Mark J Crane [email protected]

Portions created by the Initial Developer are Copyright © 2008-2016

Portions created by the Initial Developer are Copyright © 2008-2019

the Initial Developer. All Rights Reserved.

Contributor(s):

@@ -37,7 +37,8 @@

echo "access denied";

exit;

}

//get the variables

$filename = $_GET[‘filename’];

$type = $_GET[‘type’]; //moh //rec

@@ -51,7 +52,7 @@

<table width="100%" border="0" cellpadding="0" cellspacing="0">

<tr>

<td align=’center’>

<b>file: <?php echo $filename ?></b>

<b><?php echo escape($filename) ?></b>

</td>

</tr>

<tr>

@@ -69,7 +70,7 @@

}

else {

echo “<audio src=\"http://localhost:8000/mod/recordings/recordings.php?a=download&type=".urlencode($type)."&filename=".urlencode($filename)."\” autoplay=\"autoplay\"></audio>";

echo “<embed src=\"recordings.php?a=download&type=".urlencode($type)."&filename=".urlencode($filename)."\” autostart=\"true\" width=\"300\" height=\"90\" name=\"sound_".$filename."\" enablejavascript=\"true\">\n";

echo “<embed src=\"recordings.php?a=download&type=".urlencode($type)."&filename=".urlencode($filename)."\” autostart=\"true\" width=\"300\" height=\"90\" name=\"sound_".escape($filename)."\" enablejavascript=\"true\">\n";

}

}

if ($file_ext == “mp3”) {

CVE: Latest News

CVE-2023-50976: Transactions API Authorization by oleiman · Pull Request #14969 · redpanda-data/redpanda
CVE-2023-6905
CVE-2023-6903
CVE-2023-6904
CVE-2023-3907