We read every piece of feedback, and take your input very seriously.
To see all available qualifiers, see our documentation.
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Mitel MiCollab Authentication Bypass to Arbitrary File Read
https://github.com/watchtowrlabs/Mitel-MiCollab-Auth-Bypass_CVE-2024-41713?ref=labs.watchtowr.com
Not sure how popular the software is, but seems like an easy exploit, and according to https://www.theregister.com/AMP/2024/12/06/mitel_micollab_0day/#amp_tf=From%20%251%24s&aoh=17340482743523&csi=0&referrer=https%3A%2F%2Fwww.google.com the vendor doesn't seem eager to fix it.
The text was updated successfully, but these errors were encountered:
Revert "Landing rapid7#19725, fixed incorrect processing of HTTP User…
add8a7b
… Agent parameter in x64 reverse HTTP payload (Windows)" This reverts commit ebf7379, reversing changes made to 50b1259.
No branches or pull requests
Summary
Mitel MiCollab Authentication Bypass to Arbitrary File Read
Basic example
https://github.com/watchtowrlabs/Mitel-MiCollab-Auth-Bypass_CVE-2024-41713?ref=labs.watchtowr.com
Motivation
Not sure how popular the software is, but seems like an easy exploit, and according to https://www.theregister.com/AMP/2024/12/06/mitel_micollab_0day/#amp_tf=From%20%251%24s&aoh=17340482743523&csi=0&referrer=https%3A%2F%2Fwww.google.com the vendor doesn't seem eager to fix it.
The text was updated successfully, but these errors were encountered: