Unsanitized f Variable in FusionPBX Download.php Allows Arbitrary File Download

Unsanitized f Variable in FusionPBX Download.php Allows Arbitrary File Download

CVE-2019-16986 · MEDIUM Severity

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N

In FusionPBX up to v4.5.7, the file resources\download.php uses an unsanitized "f" variable coming from the URL, which takes any pathname and allows a download of it. (resources\secure_download.php is also affected.)

Learn more about our Web Application Penetration Testing UK.