Overview
- Description
- A vulnerability in the conferencing component of Mitel Connect ONSITE, versions R1711-PREM and earlier, and Mitel ST 14.2, release GA28 and earlier, could allow an unauthenticated attacker to inject PHP code using specially crafted requests to the vnewmeeting.php page. Successful exploit could allow an attacker to execute arbitrary PHP code within the context of the application.
- Source
- cve@mitre.org
- NVD status
- Modified
Risk scores
CVSS 3.0
- Type
- Primary
- Base score
- 9.8
- Impact score
- 5.9
- Exploitability score
- 3.9
- Vector string
- CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
- Severity
- CRITICAL
CVSS 2.0
- Type
- Primary
- Base score
- 10
- Impact score
- 10
- Exploitability score
- 10
- Vector string
- AV:N/AC:L/Au:N/C:C/I:C/A:C
Weaknesses
- nvd@nist.gov
- CWE-94
Social media
- Hype score
- Not currently trending
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:mitel:connect_onsite:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "880EBE7A-32CF-427A-9657-243646B56800", "versionEndIncluding": "r1711-prem" }, { "criteria": "cpe:2.3:a:mitel:st14.2:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "22CF80BB-56C8-40CF-AD9C-D8911F5D5C1E", "versionEndIncluding": "ga28" } ], "operator": "OR" } ] } ]