Rapid7 Vulnerability & Exploit Database

VICIdial Manager Send OS Command Injection

Back to Search

VICIdial Manager Send OS Command Injection



The file agc/manager_send.php in the VICIdial web application uses unsanitized user input as part of a command that is executed using the PHP passthru() function. A valid username, password and session are needed to access the injection point. Fortunately, VICIdial has two built-in accounts with default passwords and the manager_send.php file has a SQL injection vulnerability that can be used to bypass the session check as long as at least one session has been created at some point in time. In case there isn't any valid session, the user can provide astGUIcient credentials in order to create one. The results of the injected commands are returned as part of the response from the web server. Affected versions include 2.7RC1, 2.7, and 2.8-403a. Other versions are likely affected as well. The default credentials used by Vicidial are VDCL/donotedit and VDAD/donotedit.


  • Adam Caudill <adam@adamcaudill.com>
  • AverageSecurityGuy <stephen@averagesecurityguy.info>
  • sinn3r <sinn3r@metasploit.com>
  • juan vazquez <juan.vazquez@metasploit.com>




Module Options

To display the available options, load the module within the Metasploit console and run the commands 'show options' or 'show advanced':

msf > use exploit/unix/webapp/vicidial_manager_send_cmd_exec
msf exploit(vicidial_manager_send_cmd_exec) > show targets
msf exploit(vicidial_manager_send_cmd_exec) > set TARGET < target-id >
msf exploit(vicidial_manager_send_cmd_exec) > show options
    ...show and set options...
msf exploit(vicidial_manager_send_cmd_exec) > exploit

Time is precious, so I don’t want to do something manually that I can automate. Leveraging the Metasploit Framework when automating any task keeps us from having to re-create the wheel as we can use the existing libraries and focus our efforts where it matters.

– Jim O’Gorman | President, Offensive Security