Description
main/manager.c in the Manager Interface in Asterisk Open Source 1.6.2.x before 1.6.2.24, 1.8.x before 1.8.11.1, and 10.x before 10.3.1 and Asterisk Business Edition C.3.x before C.3.7.4 does not properly enforce System class authorization requirements, which allows remote authenticated users to execute arbitrary commands via (1) the originate action in the MixMonitor application, (2) the SHELL and EVAL functions in the GetVar manager action, or (3) the SHELL and EVAL functions in the Status manager action.
Published: 2012-04-30
Score: 6.5 Medium
EPSS: 4.3% Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

No analysis available yet.

Remediation

No remediation available yet.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Debian DSA Debian DSA DSA-2460-1 asterisk security update
EUVD EUVD EUVD-2012-2401 main/manager.c in the Manager Interface in Asterisk Open Source 1.6.2.x before 1.6.2.24, 1.8.x before 1.8.11.1, and 10.x before 10.3.1 and Asterisk Business Edition C.3.x before C.3.7.4 does not properly enforce System class authorization requirements, which allows remote authenticated users to execute arbitrary commands via (1) the originate action in the MixMonitor application, (2) the SHELL and EVAL functions in the GetVar manager action, or (3) the SHELL and EVAL functions in the Status manager action.
History

No history.

Subscriptions

Asterisk Open Source
cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2024-08-06T19:34:25.544Z

Reserved: 2012-04-23T00:00:00.000Z

Link: CVE-2012-2414

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Deferred

Published: 2012-04-30T20:55:02.607

Modified: 2025-04-11T00:51:21.963

Link: CVE-2012-2414

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses