Mitel MiCollab Authentication Bypass to Arbitrary File Read
See our blog post for technical details
__ ___ ___________
__ _ ______ _/ |__ ____ | |_\__ ____\____ _ ________
\ \/ \/ \__ \ ___/ ___\| | \| | / _ \ \/ \/ \_ __ \
\ / / __ \| | \ \___| Y | |( <_> \ / | | \/
\/\_/ (____ |__| \___ |___|__|__ | \__ / \/\_/ |__|
\/ \/ \/
watchtowr-vs-MiCollab_2024-12-05.py
(*) Mitel MiCollab Authentication Bypass and Arbitrary File Read exploit by watchTowr
- Sonny, watchTowr ([email protected])
CVEs: [CVE-2024-41713 - Authentication Bypass] - [CVE-2024-00000 - Arbitrary File Read]
Example Usage:
- python watchtowr-vs-MiCollab_2024-12-05.py --url http://localhost --file /etc/passwd
Mitel MiCollab 9.8 SP1 FP2 (9.8.1.201) and earlier, more details at Mitel advisory
This exploit was written by Sonny of watchTowr (@watchtowrcyber)
Follow watchTowr Labs
For the latest security research follow the watchTowr Labs Team