This is a summary of the AI-generated 10-question deep analysis. The full version (longer answers, follow-up Q&A, related CVEs) requires login. Read the full analysis β
Q1What is this vulnerability? (Essence + Consequences)
π¨ **Essence**: Remote Command Execution (RCE) in FreePBX. π **Consequences**: Attackers can steal cookies or execute arbitrary commands on the server. Itβs a critical breach of the web interface.
Q2Root Cause? (CWE/Flaw)
π‘οΈ **Root Cause**: Lack of input filtering. π **Flaw**: The `callme_startcall` function in `recordings/misc/callme_page.php` accepts user input without proper sanitization. (CWE not specified in data).
Q3Who is affected? (Versions/Components)
π¦ **Affected**: FreePBX 2.9, 2.10, and earlier versions. π **Context**: Also affects Elastix 2.2.0 (which bundles FreePBX). Itβs the GUI tool for Asterisk IP phones.
Q4What can hackers do? (Privileges/Data)
π **Attacker Power**: Full remote command execution. πͺ **Data Risk**: Can steal cookie-based authentication certificates. β οΈ **Impact**: Complete compromise of the application context.
Q5Is exploitation threshold high? (Auth/Config)
β‘ **Threshold**: Likely LOW for initial access. π **Auth**: The description implies remote exploitation via the web interface. No specific high-auth barrier is mentioned for the RCE vector itself.
Q6Is there a public Exp? (PoC/Wild Exploitation)
π **Exploit**: YES. Public PoCs exist on GitHub (Python3 scripts). π **DB**: Exploit-DB #18650 and #18659 are referenced. Wild exploitation is possible.
Q7How to self-check? (Features/Scanning)
π **Check**: Scan for `callme_page.php` endpoint. π‘ **Indicator**: Look for FreePBX/Elastix versions 2.9-2.10. Use scanners that detect RCE via unfiltered PHP parameters.
π§ **Workaround**: If unpatched, restrict access to `callme_page.php` via firewall/WAF. π« **Block**: Prevent external access to the FreePBX GUI entirely if not needed.
Q10Is it urgent? (Priority Suggestion)
π₯ **Priority**: CRITICAL (Historically). β³ **Urgency**: High for legacy systems. Since itβs an old CVE, ensure no legacy Elastix/FreePBX instances are still running online.