CVE-2019-15059

7.5 HIGH

📋 TL;DR

CVE-2019-15059 allows unauthenticated remote attackers to download Liberty lisPBX configuration backup files containing sensitive PBX information. This affects Liberty lisPBX 2.0-4 installations with default configurations. Attackers can retrieve extension numbers, contacts, and passwords without any authentication.

💻 Affected Systems

Products:
  • Liberty lisPBX
Versions: 2.0-4
Operating Systems: Linux-based systems running Liberty lisPBX
Default Config Vulnerable: ⚠️ Yes
Notes: Default installation exposes backup directories without authentication. Any Liberty lisPBX 2.0-4 installation with web interface accessible is vulnerable.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete PBX compromise including credential theft, unauthorized call routing, toll fraud, and data exfiltration of all PBX configuration and call records.

🟠

Likely Case

Attackers download configuration files containing passwords and extension details, leading to unauthorized access to PBX systems and potential call interception.

🟢

If Mitigated

If proper access controls are implemented, attackers cannot reach backup directories and sensitive data remains protected.

🌐 Internet-Facing: HIGH - The vulnerability allows unauthenticated remote access to sensitive files from internet-facing systems.
🏢 Internal Only: MEDIUM - Internal attackers could exploit this if they have network access to the PBX system.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires only HTTP GET requests to specific predictable URLs. No special tools or skills needed.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: No official vendor advisory found

Restart Required: No

Instructions:

No official patch available. Upgrade to newer version if available or implement workarounds.

🔧 Temporary Workarounds

Restrict access to backup directory

linux

Configure web server to block access to /backup/ directory

# For Apache: Add to .htaccess or virtual host config
<Directory "/path/to/lispbx/backup">
    Order deny,allow
    Deny from all
</Directory>
# For Nginx: Add to server block
location /backup/ {
    deny all;
    return 403;
}

Move backup files outside web root

linux

Change backup location to directory not accessible via web

# Edit Liberty lisPBX configuration to change backup path
# Check configuration files for backup directory settings

🧯 If You Can't Patch

  • Implement network segmentation to restrict access to PBX web interface
  • Deploy web application firewall (WAF) rules to block requests to /backup/ paths

🔍 How to Verify

Check if Vulnerable:

Attempt to access http://[PBX_IP]/backup/lispbx-CONF-YYYY-MM-DD.tar or http://[PBX_IP]/backup/lispbx-CDR-YYYY-MM-DD.tar (replace YYYY-MM-DD with recent dates). If files download without authentication, system is vulnerable.

Check Version:

Check Liberty lisPBX web interface or configuration files for version information

Verify Fix Applied:

Attempt same URLs after implementing workarounds. Should receive 403 Forbidden or similar access denied response.

📡 Detection & Monitoring

Log Indicators:

  • HTTP 200 responses to /backup/ paths in web server logs
  • Unusual file downloads from backup directory

Network Indicators:

  • HTTP GET requests to /backup/lispbx-*.tar patterns
  • Traffic to backup files from unauthorized IPs

SIEM Query:

web_access AND (url CONTAINS '/backup/lispbx-' AND url ENDS WITH '.tar')

🔗 References

📤 Share & Export