Secunia Research: FreePBX Filename Command Injection Vulnerability

====================================================================== 

                     Secunia Research 05/10/2010

        - FreePBX Filename Command Injection Vulnerability -

====================================================================== 
Table of Contents

Affected Software....................................................1
Severity.............................................................2
Vendor's Description of Software.....................................3
Description of Vulnerability.........................................4
Solution.............................................................5
Time Table...........................................................6
Credits..............................................................7
References...........................................................8
About Secunia........................................................9
Verification........................................................10

====================================================================== 
1) Affected Software 

* FreePBX 2.8.0

NOTE: Other versions may also be affected.

====================================================================== 
2) Severity 

Rating: Less critical
Impact: System access
Where:  From remote

====================================================================== 
3) Vendor's Description of Software 

"FreePBX is an easy to use GUI (graphical user interface) that 
controls and manages Asterisk, the world's most popular open source 
telephony engine software. FreePBX has been developed and hardened by 
thousands of volunteers over tens of thousands man hours.".

Product Link:
http://www.freepbx.org/

====================================================================== 
4) Description of Vulnerability

Secunia Research has discovered a vulnerability in FreePBX, which can 
be exploited by malicious users to compromise a vulnerable system.

Input passed via the filename when uploading system recordings is not 
properly sanitised before being used in a call to "system()" in 
page.recordings.php. This can be exploited to inject and execute 
arbitrary shell commands via a specially crafted HTTP POST request.

Successful exploitation requires access to the "System Recordings"
section in the administrative user interface.

====================================================================== 
5) Solution 

Fixed in the SVN repository.

====================================================================== 
6) Time Table 

27/09/2010 - Vendor notified.
27/09/2010 - Vendor response.
05/10/2010 - Public disclosure.

====================================================================== 
7) Credits 

Discovered by Secunia Research.

====================================================================== 
8) References

The Common Vulnerabilities and Exposures (CVE) project has not 
currently assigned a CVE identifier for the vulnerability.

====================================================================== 
9) About Secunia

Secunia offers vulnerability management solutions to corporate
customers with verified and reliable vulnerability intelligence
relevant to their specific system configuration:

http://secunia.com/advisories/business_solutions/

Secunia also provides a publicly accessible and comprehensive advisory
database as a service to the security community and private 
individuals, who are interested in or concerned about IT-security.

http://secunia.com/advisories/

Secunia believes that it is important to support the community and to
do active vulnerability research in order to aid improving the 
security and reliability of software in general:

http://secunia.com/secunia_research/

Secunia regularly hires new skilled team members. Check the URL below
to see currently vacant positions:

http://secunia.com/corporate/jobs/

Secunia offers a FREE mailing list called Secunia Security Advisories:

http://secunia.com/advisories/mailing_lists/

====================================================================== 
10) Verification 

Please verify this advisory by visiting the Secunia website:
http://secunia.com/secunia_research/2010-116/

Complete list of vulnerability reports published by Secunia Research:
http://secunia.com/secunia_research/

======================================================================