Dismissed
by @LeSuisse Activity log
- Created automatic suggestion
-
@LeSuisse
removed
54 packages
- tts
- freetts
- marytts
- nanotts
- picotts
- piper-tts
- pocket-tts
- libgringotts
- pkgsRocm.tts
- tts-mod-vault
- pkgsRocm.piper-tts
- pkgsRocm.pocket-tts
- python312Packages.gtts
- python313Packages.gtts
- python314Packages.gtts
- python312Packages.pyttsx3
- python312Packages.trainer
- python313Packages.pyttsx3
- python313Packages.trainer
- python314Packages.pyttsx3
- python314Packages.trainer
- python312Packages.edge-tts
- python313Packages.edge-tts
- python314Packages.edge-tts
- python312Packages.gtts-token
- python313Packages.gtts-token
- python313Packages.pocket-tts
- python314Packages.gtts-token
- python314Packages.pocket-tts
- python312Packages.ttstokenizer
- python313Packages.ttstokenizer
- python314Packages.ttstokenizer
- python312Packages.growattserver
- python312Packages.pycsspeechtts
- python313Packages.growattserver
- python313Packages.pycsspeechtts
- python314Packages.growattserver
- python314Packages.pycsspeechtts
- pkgsRocm.python3Packages.trainer
- home-assistant-component-tests.tts
- pkgsRocm.python3Packages.pocket-tts
- python312Packages.brottsplatskartan
- python313Packages.brottsplatskartan
- python314Packages.brottsplatskartan
- home-assistant-component-tests.marytts
- home-assistant-component-tests.yandextts
- tests.home-assistant-component-tests.tts
- home-assistant-component-tests.clicksend_tts
- tests.home-assistant-component-tests.marytts
- tests.home-assistant-component-tests.yandextts
- home-assistant-custom-components.elevenlabs_tts
- home-assistant-component-tests.brottsplatskartan
- tests.home-assistant-component-tests.clicksend_tts
- tests.home-assistant-component-tests.brottsplatskartan
- @LeSuisse dismissed
Authenticated SQL Injection in FreePBX tts (Text To Speech) module
The FreePBX module tts (Text to Speech) for FreePBX, an open-source web-based graphical user interface (GUI) that manages Asterisk. Versions prior to 16.0.5 and 17.0.5 are vulnerable to SQL injection by authenticated users with administrator access. Authenticated users with administrative access to the Administrator Control Panel (ACP) can leverage this SQL injection vulnerability to extract sensitive information from the database and execute code on the system as the `asterisk` user with chained elevation to `root` privileges. Users should upgrade to version 16.0.5 or 17.0.5 to receive a fix.
References
- https://github.com/FreePBX/security-reporting/security/advisories/GHSA-632c-49p9-x7cw x_refsource_CONFIRM
- https://www.freepbx.org/watch-what-we-do-with-security-fixes-%f0%9f%91%80 x_refsource_MISC
- https://github.com/FreePBX/security-reporting/security/advisories/GHSA-632c-49p9-x7cw x_refsource_CONFIRM
- https://www.freepbx.org/watch-what-we-do-with-security-fixes-%f0%9f%91%80 x_refsource_MISC
- https://github.com/FreePBX/security-reporting/security/advisories/GHSA-632c-49p9-x7cw x_refsource_CONFIRM
- https://www.freepbx.org/watch-what-we-do-with-security-fixes-%f0%9f%91%80 x_refsource_MISC
Affected products
tts
- ==< 16.0.5
- ==>= 17.0.0, < 17.0.5
security-reporting
- ==< 16.0.5
- ==>= 17.0.0, < 17.0.5