Asterisk is an open source private branch exchange (PBX) and telephony toolkit. Prior to asterisk versions 18.24.2, 20.9.2, and 21.4.2 and certified-asterisk versions 18.9-cert11 and 20.7-cert2, an AMI user with `write=originate` may change all configuration files in the `/etc/asterisk/` directory. This occurs because they are able to curl remote files and write them to disk, but are also able to append to existing files using the `FILE` function inside the `SET` application. This issue may result in privilege escalation, remote code execution and/or blind server-side request forgery with arbitrary protocol. Asterisk versions 18.24.2, 20.9.2, and 21.4.2 and certified-asterisk versions 18.9-cert11 and 20.7-cert2 contain a fix for this issue.
Metrics
Affected Vendors & Products
References
History
Mon, 16 Sep 2024 20:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Weaknesses | NVD-CWE-Other | |
CPEs | cpe:2.3:a:asterisk:asterisk:21.4.0:*:*:*:*:*:*:* cpe:2.3:a:asterisk:certified_asterisk:13.13.0:*:*:*:*:*:*:* cpe:2.3:a:asterisk:certified_asterisk:13.13.0:cert1-rc1:*:*:*:*:*:* cpe:2.3:a:asterisk:certified_asterisk:13.13.0:cert1-rc2:*:*:*:*:*:* cpe:2.3:a:asterisk:certified_asterisk:13.13.0:cert1-rc3:*:*:*:*:*:* cpe:2.3:a:asterisk:certified_asterisk:13.13.0:cert1-rc4:*:*:*:*:*:* cpe:2.3:a:asterisk:certified_asterisk:13.13.0:cert1:*:*:*:*:*:* cpe:2.3:a:asterisk:certified_asterisk:13.13.0:cert2:*:*:*:*:*:* cpe:2.3:a:asterisk:certified_asterisk:13.13.0:cert3:*:*:*:*:*:* cpe:2.3:a:asterisk:certified_asterisk:13.13.0:rc1:*:*:*:*:*:* cpe:2.3:a:asterisk:certified_asterisk:13.13.0:rc2:*:*:*:*:*:* cpe:2.3:a:asterisk:certified_asterisk:16.8.0:-:*:*:*:*:*:* cpe:2.3:a:asterisk:certified_asterisk:16.8.0:cert10:*:*:*:*:*:* cpe:2.3:a:asterisk:certified_asterisk:16.8.0:cert11:*:*:*:*:*:* cpe:2.3:a:asterisk:certified_asterisk:16.8.0:cert12:*:*:*:*:*:* cpe:2.3:a:asterisk:certified_asterisk:16.8.0:cert1:*:*:*:*:*:* cpe:2.3:a:asterisk:certified_asterisk:16.8.0:cert2:*:*:*:*:*:* cpe:2.3:a:asterisk:certified_asterisk:16.8.0:cert3:*:*:*:*:*:* cpe:2.3:a:asterisk:certified_asterisk:16.8.0:cert4:*:*:*:*:*:* cpe:2.3:a:asterisk:certified_asterisk:16.8.0:cert5:*:*:*:*:*:* cpe:2.3:a:asterisk:certified_asterisk:16.8.0:cert6:*:*:*:*:*:* cpe:2.3:a:asterisk:certified_asterisk:16.8.0:cert7:*:*:*:*:*:* cpe:2.3:a:asterisk:certified_asterisk:16.8.0:cert8:*:*:*:*:*:* cpe:2.3:a:asterisk:certified_asterisk:16.8.0:cert9:*:*:*:*:*:* cpe:2.3:a:asterisk:certified_asterisk:16.8:cert1-rc1:*:*:*:*:*:* cpe:2.3:a:asterisk:certified_asterisk:16.8:cert1-rc2:*:*:*:*:*:* cpe:2.3:a:asterisk:certified_asterisk:16.8:cert1-rc3:*:*:*:*:*:* cpe:2.3:a:asterisk:certified_asterisk:16.8:cert1-rc4:*:*:*:*:*:* cpe:2.3:a:asterisk:certified_asterisk:16.8:cert1-rc5:*:*:*:*:*:* cpe:2.3:a:asterisk:certified_asterisk:16.8:cert10:*:*:*:*:*:* cpe:2.3:a:asterisk:certified_asterisk:16.8:cert11:*:*:*:*:*:* cpe:2.3:a:asterisk:certified_asterisk:16.8:cert12:*:*:*:*:*:* cpe:2.3:a:asterisk:certified_asterisk:16.8:cert13:*:*:*:*:*:* cpe:2.3:a:asterisk:certified_asterisk:16.8:cert14:*:*:*:*:*:* cpe:2.3:a:asterisk:certified_asterisk:16.8:cert4-rc1:*:*:*:*:*:* cpe:2.3:a:asterisk:certified_asterisk:16.8:cert4-rc2:*:*:*:*:*:* cpe:2.3:a:asterisk:certified_asterisk:16.8:cert4-rc3:*:*:*:*:*:* cpe:2.3:a:asterisk:certified_asterisk:16.8:cert4-rc4:*:*:*:*:*:* cpe:2.3:a:asterisk:certified_asterisk:18.9:cert1-rc1:*:*:*:*:*:* cpe:2.3:a:asterisk:certified_asterisk:18.9:cert10:*:*:*:*:*:* cpe:2.3:a:asterisk:certified_asterisk:18.9:cert1:*:*:*:*:*:* cpe:2.3:a:asterisk:certified_asterisk:18.9:cert2:*:*:*:*:*:* cpe:2.3:a:asterisk:certified_asterisk:18.9:cert3:*:*:*:*:*:* cpe:2.3:a:asterisk:certified_asterisk:18.9:cert4:*:*:*:*:*:* cpe:2.3:a:asterisk:certified_asterisk:18.9:cert5:*:*:*:*:*:* cpe:2.3:a:asterisk:certified_asterisk:18.9:cert6:*:*:*:*:*:* cpe:2.3:a:asterisk:certified_asterisk:18.9:cert7:*:*:*:*:*:* cpe:2.3:a:asterisk:certified_asterisk:18.9:cert8-rc1:*:*:*:*:*:* cpe:2.3:a:asterisk:certified_asterisk:18.9:cert8-rc2:*:*:*:*:*:* cpe:2.3:a:asterisk:certified_asterisk:18.9:cert8:*:*:*:*:*:* cpe:2.3:a:asterisk:certified_asterisk:18.9:cert9:*:*:*:*:*:* cpe:2.3:a:asterisk:certified_asterisk:20.7:cert1-rc1:*:*:*:*:*:* cpe:2.3:a:asterisk:certified_asterisk:20.7:cert1-rc2:*:*:*:*:*:* cpe:2.3:a:asterisk:certified_asterisk:20.7:cert1:*:*:*:*:*:* |
Mon, 12 Aug 2024 16:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
CPEs | cpe:2.3:a:asterisk:asterisk:21.0.0:*:*:*:*:*:*:* cpe:2.3:a:asterisk:certified_asterisk:19.0:*:*:*:*:*:*:* |
Fri, 09 Aug 2024 05:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
References |
| |
Metrics |
threat_severity
|
threat_severity
|
Thu, 08 Aug 2024 17:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Asterisk
Asterisk asterisk Asterisk certified Asterisk |
|
CPEs | cpe:2.3:a:asterisk:asterisk:*:*:*:*:*:*:*:* cpe:2.3:a:asterisk:asterisk:19.0.0:*:*:*:*:*:*:* cpe:2.3:a:asterisk:asterisk:21.0.0:*:*:*:*:*:*:* cpe:2.3:a:asterisk:certified_asterisk:*:*:*:*:*:*:*:* cpe:2.3:a:asterisk:certified_asterisk:19.0:*:*:*:*:*:*:* |
|
Vendors & Products |
Asterisk
Asterisk asterisk Asterisk certified Asterisk |
|
Metrics |
ssvc
|
Thu, 08 Aug 2024 16:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | Asterisk is an open source private branch exchange (PBX) and telephony toolkit. Prior to asterisk versions 18.24.2, 20.9.2, and 21.4.2 and certified-asterisk versions 18.9-cert11 and 20.7-cert2, an AMI user with `write=originate` may change all configuration files in the `/etc/asterisk/` directory. This occurs because they are able to curl remote files and write them to disk, but are also able to append to existing files using the `FILE` function inside the `SET` application. This issue may result in privilege escalation, remote code execution and/or blind server-side request forgery with arbitrary protocol. Asterisk versions 18.24.2, 20.9.2, and 21.4.2 and certified-asterisk versions 18.9-cert11 and 20.7-cert2 contain a fix for this issue. | |
Title | Asterisk allows `Write=originate` as sufficient permissions for code execution / `System()` dialplan | |
Weaknesses | CWE-1220 CWE-267 |
|
References |
|
|
Metrics |
cvssV3_1
|
MITRE
Status: PUBLISHED
Assigner: GitHub_M
Published: 2024-08-08T16:29:07.436Z
Updated: 2024-08-12T15:49:00.190Z
Reserved: 2024-07-30T14:01:33.923Z
Link: CVE-2024-42365
Vulnrichment
Updated: 2024-08-08T16:43:53.890Z
NVD
Status : Analyzed
Published: 2024-08-08T17:15:19.340
Modified: 2024-09-16T20:23:18.407
Link: CVE-2024-42365
Redhat