FKIE_CVE-2024-24386
Vulnerability from fkie_nvd - Published: 2024-02-15 08:15 - Updated: 2025-09-18 16:22
Severity ?
Summary
An issue in VitalPBX v.3.2.4-5 allows an attacker to execute arbitrary code via a crafted payload to the /var/lib/vitalpbx/scripts folder.
References
| URL | Tags | ||
|---|---|---|---|
| cve@mitre.org | https://erickduarte.notion.site/VitalPBX-3-2-4-5-ee402173241c493687aa22ec60160c67?pvs=4 | Exploit, Third Party Advisory | |
| cve@mitre.org | https://github.com/erick-duarte/CVE-2024-24386 | Exploit, Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://erickduarte.notion.site/VitalPBX-3-2-4-5-ee402173241c493687aa22ec60160c67?pvs=4 | Exploit, Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://github.com/erick-duarte/CVE-2024-24386 | Exploit, Third Party Advisory |
Impacted products
| Vendor | Product | Version | |
|---|---|---|---|
| vitalpbx | vitalpbx | 3.0.4 | |
| vitalpbx | vitalpbx | 3.0.4-2 | |
| vitalpbx | vitalpbx | 3.0.4-4 | |
| vitalpbx | vitalpbx | 3.0.6-1 | |
| vitalpbx | vitalpbx | 3.0.6-2 | |
| vitalpbx | vitalpbx | 3.0.8 | |
| vitalpbx | vitalpbx | 3.0.8 | |
| vitalpbx | vitalpbx | 3.0.8 | |
| vitalpbx | vitalpbx | 3.0.9 | |
| vitalpbx | vitalpbx | 3.0.9 | |
| vitalpbx | vitalpbx | 3.1.0 | |
| vitalpbx | vitalpbx | 3.1.1 | |
| vitalpbx | vitalpbx | 3.1.1 | |
| vitalpbx | vitalpbx | 3.1.1 | |
| vitalpbx | vitalpbx | 3.1.2 | |
| vitalpbx | vitalpbx | 3.1.3 | |
| vitalpbx | vitalpbx | 3.1.4 | |
| vitalpbx | vitalpbx | 3.1.4 | |
| vitalpbx | vitalpbx | 3.1.5 | |
| vitalpbx | vitalpbx | 3.1.5 | |
| vitalpbx | vitalpbx | 3.1.5 | |
| vitalpbx | vitalpbx | 3.1.5 | |
| vitalpbx | vitalpbx | 3.1.6 | |
| vitalpbx | vitalpbx | 3.1.7 | |
| vitalpbx | vitalpbx | 3.2.1 | |
| vitalpbx | vitalpbx | 3.2.2 | |
| vitalpbx | vitalpbx | 3.2.3 | |
| vitalpbx | vitalpbx | 3.2.3 | |
| vitalpbx | vitalpbx | 3.2.3 | |
| vitalpbx | vitalpbx | 3.2.3 | |
| vitalpbx | vitalpbx | 3.2.3 | |
| vitalpbx | vitalpbx | 3.2.3 | |
| vitalpbx | vitalpbx | 3.2.3 | |
| vitalpbx | vitalpbx | 3.2.3 | |
| vitalpbx | vitalpbx | 3.2.4 | |
| vitalpbx | vitalpbx | 3.2.4 | |
| vitalpbx | vitalpbx | 3.2.4 | |
| vitalpbx | vitalpbx | 3.2.4 | |
| vitalpbx | vitalpbx | 3.2.4 | |
| vitalpbx | vitalpbx | 3.2.5 |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:vitalpbx:vitalpbx:3.0.4:*:*:*:*:*:*:*",
"matchCriteriaId": "7AA3E209-B4A1-46BE-900E-A1798EEAB862",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:vitalpbx:vitalpbx:3.0.4-2:*:*:*:*:*:*:*",
"matchCriteriaId": "D6201481-7B1F-46A8-A351-F2E175D1469F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:vitalpbx:vitalpbx:3.0.4-4:*:*:*:*:*:*:*",
"matchCriteriaId": "68266050-59C6-4E66-931A-CBEEB113FE48",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:vitalpbx:vitalpbx:3.0.6-1:*:*:*:*:*:*:*",
"matchCriteriaId": "5BDC647C-314F-4595-9089-2E6442DF2D98",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:vitalpbx:vitalpbx:3.0.6-2:*:*:*:*:*:*:*",
"matchCriteriaId": "4530FE16-EF04-4BF4-B40A-7E5C425DA7E7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:vitalpbx:vitalpbx:3.0.8:-:*:*:*:*:*:*",
"matchCriteriaId": "B92D456C-2C67-4CC7-9D50-FB0BDB1055BE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:vitalpbx:vitalpbx:3.0.8:r2:*:*:*:*:*:*",
"matchCriteriaId": "6657D9A5-C96F-415F-A47C-384076268774",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:vitalpbx:vitalpbx:3.0.8:r3:*:*:*:*:*:*",
"matchCriteriaId": "8DA04EFB-2EB9-46DB-871E-9F241DE3CC64",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:vitalpbx:vitalpbx:3.0.9:r3:*:*:*:*:*:*",
"matchCriteriaId": "150E347A-CFEC-4DB2-B639-DB0CFF703A1D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:vitalpbx:vitalpbx:3.0.9:r5:*:*:*:*:*:*",
"matchCriteriaId": "DCFBEC08-6DED-44C5-AE58-CC581674AA42",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:vitalpbx:vitalpbx:3.1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "0341F1CA-351A-41B9-BCE8-F1BCD6577CF8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:vitalpbx:vitalpbx:3.1.1:-:*:*:*:*:*:*",
"matchCriteriaId": "BB2352CA-E64C-44B8-8211-BA31E2712AC2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:vitalpbx:vitalpbx:3.1.1:r2:*:*:*:*:*:*",
"matchCriteriaId": "994D7C50-0904-4E8E-88AC-1F3A0B69AFBF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:vitalpbx:vitalpbx:3.1.1:r3:*:*:*:*:*:*",
"matchCriteriaId": "6E98C8CE-666B-4D2D-A604-75157B9BA4CE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:vitalpbx:vitalpbx:3.1.2:r1:*:*:*:*:*:*",
"matchCriteriaId": "1FD9E729-FF63-4B16-9C1B-17EDC4DDBB66",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:vitalpbx:vitalpbx:3.1.3:r1:*:*:*:*:*:*",
"matchCriteriaId": "5D4B3582-C31F-4F40-A523-97E776332982",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:vitalpbx:vitalpbx:3.1.4:r1:*:*:*:*:*:*",
"matchCriteriaId": "329EEA3D-31FE-4042-A811-993BD5135CC6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:vitalpbx:vitalpbx:3.1.4:r2:*:*:*:*:*:*",
"matchCriteriaId": "5F17CD04-11B5-45A9-8984-231C1BE87659",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:vitalpbx:vitalpbx:3.1.5:r1:*:*:*:*:*:*",
"matchCriteriaId": "BF2A090A-A386-462A-ADC6-4EA984E254F5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:vitalpbx:vitalpbx:3.1.5:r2:*:*:*:*:*:*",
"matchCriteriaId": "604234F5-28D4-42A1-A7A6-487A2812E556",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:vitalpbx:vitalpbx:3.1.5:r3:*:*:*:*:*:*",
"matchCriteriaId": "E1A077CB-1FB6-4D0A-8E96-3640B185C3F3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:vitalpbx:vitalpbx:3.1.5:r4:*:*:*:*:*:*",
"matchCriteriaId": "EFA96AC8-4991-4E3C-A5EE-BB9975ED2AFF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:vitalpbx:vitalpbx:3.1.6:r1:*:*:*:*:*:*",
"matchCriteriaId": "E23AFB78-9257-4DA6-8F9A-3FBCA07E44F6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:vitalpbx:vitalpbx:3.1.7:r1:*:*:*:*:*:*",
"matchCriteriaId": "CB3F9A87-3402-4249-A996-971A9EF2B93B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:vitalpbx:vitalpbx:3.2.1:*:*:*:*:*:*:*",
"matchCriteriaId": "95B133E3-80F2-4A2E-BE44-AA12D957E572",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:vitalpbx:vitalpbx:3.2.2:r1:*:*:*:*:*:*",
"matchCriteriaId": "C6F63367-FC93-47BE-BD82-B54BCFD20A39",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:vitalpbx:vitalpbx:3.2.3:r1:*:*:*:*:*:*",
"matchCriteriaId": "5E9907EF-606B-451F-AFCF-1313841B967B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:vitalpbx:vitalpbx:3.2.3:r2:*:*:*:*:*:*",
"matchCriteriaId": "AF2A7259-A825-48DF-BA0E-C651D48E1EEB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:vitalpbx:vitalpbx:3.2.3:r4:*:*:*:*:*:*",
"matchCriteriaId": "96959EA1-CDCC-4866-B88E-527B5140ED58",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:vitalpbx:vitalpbx:3.2.3:r5:*:*:*:*:*:*",
"matchCriteriaId": "FE44F01C-22D7-467B-8EED-C9E1A47FD70B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:vitalpbx:vitalpbx:3.2.3:r6:*:*:*:*:*:*",
"matchCriteriaId": "8F33F845-5F29-437E-B300-275251D48F8C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:vitalpbx:vitalpbx:3.2.3:r7:*:*:*:*:*:*",
"matchCriteriaId": "FF1EDF5D-5FDF-49FB-90A0-86430A50E7C4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:vitalpbx:vitalpbx:3.2.3:r8:*:*:*:*:*:*",
"matchCriteriaId": "C0349C89-A58F-4D2A-AAE1-39C3DCAD0550",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:vitalpbx:vitalpbx:3.2.3:r9:*:*:*:*:*:*",
"matchCriteriaId": "6B1C36E3-8282-48B8-8915-B291FA8000C2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:vitalpbx:vitalpbx:3.2.4:r1:*:*:*:*:*:*",
"matchCriteriaId": "4F8ADEF0-B388-4479-81C9-616A167DA6FD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:vitalpbx:vitalpbx:3.2.4:r2:*:*:*:*:*:*",
"matchCriteriaId": "49F21157-8381-4639-8A29-06D1AB981021",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:vitalpbx:vitalpbx:3.2.4:r4:*:*:*:*:*:*",
"matchCriteriaId": "C15D6CE0-5003-468F-B5D4-74DC26049925",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:vitalpbx:vitalpbx:3.2.4:r5:*:*:*:*:*:*",
"matchCriteriaId": "B3A61623-D490-4227-BD3A-05C55B45D45C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:vitalpbx:vitalpbx:3.2.4:r6:*:*:*:*:*:*",
"matchCriteriaId": "0D84418D-A1EE-4F87-ADA8-75C240757F38",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:vitalpbx:vitalpbx:3.2.5:r1:*:*:*:*:*:*",
"matchCriteriaId": "1AAA26ED-9B33-4202-8163-0F7189833167",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "An issue in VitalPBX v.3.2.4-5 allows an attacker to execute arbitrary code via a crafted payload to the /var/lib/vitalpbx/scripts folder."
},
{
"lang": "es",
"value": "Un problema en VitalPBX v.3.2.4-5 permite a un atacante ejecutar c\u00f3digo arbitrario a trav\u00e9s de un payload manipulado en la carpeta /var/lib/vitalpbx/scripts."
}
],
"id": "CVE-2024-24386",
"lastModified": "2025-09-18T16:22:11.717",
"metrics": {
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.2,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 1.2,
"impactScore": 5.9,
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary"
}
]
},
"published": "2024-02-15T08:15:46.497",
"references": [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://erickduarte.notion.site/VitalPBX-3-2-4-5-ee402173241c493687aa22ec60160c67?pvs=4"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/erick-duarte/CVE-2024-24386"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://erickduarte.notion.site/VitalPBX-3-2-4-5-ee402173241c493687aa22ec60160c67?pvs=4"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/erick-duarte/CVE-2024-24386"
}
],
"sourceIdentifier": "cve@mitre.org",
"vulnStatus": "Analyzed",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-284"
}
],
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary"
}
]
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…