Recommended VICIdial Security Upgrade Notice: September 2024
Posted: Tue Sep 17, 2024 7:48 am
Please read this carefully as it contains important information regarding the security of your VICIdial system.
Due to the recent discovery of two new security risks in the admin and agent web interface code, we have rolled out an update to the VICIdial code-base. These vulnerabilities have already been patched in the open-source codebase. Any system that is at SVN revision 3848 or greater already has these changes(July 8, 2024). If your system is below that version, we strongly recommend that you upgrade VICIdial to address these concerns.
Instructions for how to connect to our public SVN server to get the latest code are available here:
http://wiki.vicidial.org/doku.php?id=svn
You can also find recent snapshots of the svn code available here:
https://www.vicidial.org/svn_trunk_nightly/
If you have a VICIhost account with us, know that we have already upgraded all servers and there is nothing that needs to be done on your end.
This Upgrade Notice covers two separate CVEs that have been published in the last week. These vulnerabilities involve PHP specifically, most of them require authenticated user access to your VICIdial system to exploit. Most of these exploits involved incomplete PHP input variable filtering.
Here are the details on the two CVEs:
https://korelogic.com/Resources/Advisor ... 24-011.txt
https://korelogic.com/Resources/Advisor ... 24-012.txt
If you have any questions about this notice, please contact us or reply to this post.
Due to the recent discovery of two new security risks in the admin and agent web interface code, we have rolled out an update to the VICIdial code-base. These vulnerabilities have already been patched in the open-source codebase. Any system that is at SVN revision 3848 or greater already has these changes(July 8, 2024). If your system is below that version, we strongly recommend that you upgrade VICIdial to address these concerns.
Instructions for how to connect to our public SVN server to get the latest code are available here:
http://wiki.vicidial.org/doku.php?id=svn
You can also find recent snapshots of the svn code available here:
https://www.vicidial.org/svn_trunk_nightly/
If you have a VICIhost account with us, know that we have already upgraded all servers and there is nothing that needs to be done on your end.
This Upgrade Notice covers two separate CVEs that have been published in the last week. These vulnerabilities involve PHP specifically, most of them require authenticated user access to your VICIdial system to exploit. Most of these exploits involved incomplete PHP input variable filtering.
Here are the details on the two CVEs:
https://korelogic.com/Resources/Advisor ... 24-011.txt
https://korelogic.com/Resources/Advisor ... 24-012.txt
If you have any questions about this notice, please contact us or reply to this post.