Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2022-42706

Опубликовано: 05 дек. 2022
Источник: debian
EPSS Низкий

Описание

An issue was discovered in Sangoma Asterisk through 16.28, 17 and 18 through 18.14, 19 through 19.6, and certified through 18.9-cert1. GetConfig, via Asterisk Manager Interface, allows a connected application to access files outside of the asterisk configuration directory, aka Directory Traversal.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
asteriskfixed1:20.0.1~dfsg+~cs6.12.40431414-1package

Примечания

  • https://issues.asterisk.org/jira/browse/ASTERISK-30176

  • https://downloads.asterisk.org/pub/security/AST-2022-009.html

  • https://git.asterisk.org/gitweb/?p=asterisk/asterisk.git;a=commit;h=81f10e847efdbe8ec264062ee234e1098c29b3f6

EPSS

Процентиль: 60%
0.00403
Низкий

Связанные уязвимости

CVSS3: 4.9
ubuntu
около 3 лет назад

An issue was discovered in Sangoma Asterisk through 16.28, 17 and 18 through 18.14, 19 through 19.6, and certified through 18.9-cert1. GetConfig, via Asterisk Manager Interface, allows a connected application to access files outside of the asterisk configuration directory, aka Directory Traversal.

CVSS3: 4.9
nvd
около 3 лет назад

An issue was discovered in Sangoma Asterisk through 16.28, 17 and 18 through 18.14, 19 through 19.6, and certified through 18.9-cert1. GetConfig, via Asterisk Manager Interface, allows a connected application to access files outside of the asterisk configuration directory, aka Directory Traversal.

CVSS3: 4.9
github
около 3 лет назад

An issue was discovered in Sangoma Asterisk through 16.28, 17 and 18 through 18.14, 19 through 19.6, and certified through 18.9-cert1. GetConfig, via Asterisk Manager Interface, allows a connected application to access files outside of the asterisk configuration directory, aka Directory Traversal.

EPSS

Процентиль: 60%
0.00403
Низкий