An issue was discovered in Sangoma Asterisk through 18.20.0, 19.x and 20.x through 20.5.0, and 21.x through 21.0.0, and Certified Asterisk through 18.9-cert5. In manager.c, the functions action_getconfig() and action_getconfigJson() do not process the input file path, resulting in a path traversal vulnerability. In versions without the restrictedFile() function, no processing is done on the input path. In versions with the restrictedFile() function, path traversal is not processed.
Metrics
Affected Vendors & Products
References
History
Thu, 24 Oct 2024 14:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Sangoma
Sangoma asterisk Sangoma certified Asterisk |
|
CPEs | cpe:2.3:a:sangoma:asterisk:*:*:*:*:*:*:*:* cpe:2.3:a:sangoma:asterisk:21.0.0:*:*:*:*:*:*:* cpe:2.3:a:sangoma:certified_asterisk:*:*:*:*:*:*:*:* cpe:2.3:a:sangoma:certified_asterisk:18.9:cert1-rc1:*:*:*:*:*:* cpe:2.3:a:sangoma:certified_asterisk:18.9:cert1:*:*:*:*:*:* cpe:2.3:a:sangoma:certified_asterisk:18.9:cert2:*:*:*:*:*:* cpe:2.3:a:sangoma:certified_asterisk:18.9:cert3:*:*:*:*:*:* cpe:2.3:a:sangoma:certified_asterisk:18.9:cert4:*:*:*:*:*:* cpe:2.3:a:sangoma:certified_asterisk:18.9:cert5:*:*:*:*:*:* |
|
Vendors & Products |
Sangoma
Sangoma asterisk Sangoma certified Asterisk |
Tue, 22 Oct 2024 20:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Asterisk
Asterisk asterisk Asterisk certified Asterisk |
|
Weaknesses | CWE-22 | |
CPEs | cpe:2.3:a:asterisk:asterisk:*:*:*:*:*:*:*:* cpe:2.3:a:asterisk:certified_asterisk:*:*:*:*:*:*:*:* |
|
Vendors & Products |
Asterisk
Asterisk asterisk Asterisk certified Asterisk |
|
Metrics |
cvssV3_1
|
Mon, 21 Oct 2024 00:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | An issue was discovered in Sangoma Asterisk through 18.20.0, 19.x and 20.x through 20.5.0, and 21.x through 21.0.0, and Certified Asterisk through 18.9-cert5. In manager.c, the functions action_getconfig() and action_getconfigJson() do not process the input file path, resulting in a path traversal vulnerability. In versions without the restrictedFile() function, no processing is done on the input path. In versions with the restrictedFile() function, path traversal is not processed. | |
References |
|
MITRE
Status: PUBLISHED
Assigner: mitre
Published: 2024-10-21T00:00:00
Updated: 2024-10-22T19:38:14.787Z
Reserved: 2024-10-14T00:00:00
Link: CVE-2024-49215
Vulnrichment
Updated: 2024-10-21T13:27:14.609Z
NVD
Status : Analyzed
Published: 2024-10-21T01:15:02.943
Modified: 2024-10-24T14:10:17.137
Link: CVE-2024-49215
Redhat
No data.