ID

VAR-200909-0577


TITLE

Avaya Intuity Audix LX Multiple Input Validation Vulnerabilities

Trust: 0.6

sources: CNVD: CNVD-2009-5003

DESCRIPTION

Intuity Audix LX is a powerful multimedia messaging server. Multiple CGI perl scripts in the /html/cswebadm/basic/cgibin/ directory of Intuity Audix LX do not properly validate user-submitted parameter requests, and remote attackers can execute arbitrary code by submitting HTTP POST requests; The url parameter of /cgi-bin/smallmenu.pl may cause cross-site scripting attacks; the use of tokenization protection management changes when logging into the web interface may result in cross-site request forgery attacks. Avaya Intuity Audix LX is prone to multiple remote vulnerabilities, including: 1. Multiple remote command-execution vulnerabilities 2. A cross-site request-forgery vulnerability 3. A cross-site scripting vulnerability Attackers can exploit these issues to execute arbitrary commands with the privileges of 'vexvm' on the underlying system, steal cookie-based authentication credentials, execute arbitrary script code, and perform administrative tasks. Other attacks are also possible

Trust: 0.81

sources: CNVD: CNVD-2009-5003 // BID: 36450

IOT TAXONOMY

category:['Network device']sub_category: -

Trust: 0.6

sources: CNVD: CNVD-2009-5003

AFFECTED PRODUCTS

vendor:nomodel: - scope: - version: -

Trust: 0.6

vendor:avayamodel:intuity audix lx r1.1scope: - version: -

Trust: 0.3

sources: CNVD: CNVD-2009-5003 // BID: 36450

CVSS

SEVERITY

CVSSV2

CVSSV3

CNVD: CNVD-2009-5003
value: HIGH

Trust: 0.6

CNVD: CNVD-2009-5003
severity: HIGH
baseScore: 10.0
vectorString: AV:N/AC:L/AU:N/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.6

sources: CNVD: CNVD-2009-5003

THREAT TYPE

network

Trust: 0.3

sources: BID: 36450

TYPE

Input Validation Error

Trust: 0.3

sources: BID: 36450

EXTERNAL IDS

db:BIDid:36450

Trust: 0.9

db:CNVDid:CNVD-2009-5003

Trust: 0.6

sources: CNVD: CNVD-2009-5003 // BID: 36450

REFERENCES

url:http://www.gnucitizen.org/static/blog/2009/09/avaya_intuity_remote_command_execution.pdf

Trust: 0.9

url:http://support.avaya.com/japple/css/japple?page=product&temp.productid=136319

Trust: 0.3

sources: CNVD: CNVD-2009-5003 // BID: 36450

CREDITS

Adrian 'pagvac' Pastor

Trust: 0.3

sources: BID: 36450

SOURCES

db:CNVDid:CNVD-2009-5003
db:BIDid:36450

LAST UPDATE DATE

2022-05-17T01:41:45.787000+00:00


SOURCES UPDATE DATE

db:CNVDid:CNVD-2009-5003date:2014-02-11T00:00:00
db:BIDid:36450date:2011-01-05T21:12:00

SOURCES RELEASE DATE

db:CNVDid:CNVD-2009-5003date:2009-09-18T00:00:00
db:BIDid:36450date:2009-09-18T00:00:00