This Metasploit module exploits an authenticated command injection vulnerability in FusionPBX versions 4.4.3 and prior. The exec.php file within the Operator Panel permits users with operator_panel_view permissions, or administrator permissions, to execute arbitrary commands as the web server user by sending a system command to the FreeSWITCH event socket interface. This module has been tested successfully on FusionPBX version 4.4.1 on Ubuntu 19.04 (x64).
38468e6614fd2cb8667101b151bf487ee43e93ccd419b6ad4216f21cee042b1e
FusionPBX versions 4.4.3 and below suffer from a remote code execution vulnerability via cross site scripting.
2116c72ea7f7eb6337234a9d1cddbfc94c56900a0a24c8146f1617c1a0139fca
BlogEngine.NET version 3.3.6 suffers from code execution and directory traversal vulnerabilities.
e49280b62c0fab022834f64d848d66c34f0be69807c773aa5c6000bf8eead37e