Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2024-57520

Опубликовано: 05 фев. 2025
Источник: debian

Описание

Insecure Permissions vulnerability in asterisk v22 allows a remote attacker to execute arbitrary code via the action_createconfig function. NOTE: this is disputed by the Supplier because the impact is limited to creating empty files outside of the Asterisk product directory (aka directory traversal) and the attack can only be performed by a privileged user who has the ability to manage the configuration.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
asteriskfixed1:22.3.0~dfsg+~cs6.15.60671435-1package

Примечания

  • https://gist.github.com/hyp164D1/ae76ab25acfbe263b2ed7b24b6e5c621

  • https://github.com/asterisk/asterisk/issues/1122

  • https://github.com/asterisk/asterisk/commit/d184ae428df0740da02bf7ba7d9e7a7fcb7502fd (22.3.0-rc1)

  • Negligible security impact

Связанные уязвимости

CVSS3: 9.8
ubuntu
около 1 года назад

Insecure Permissions vulnerability in asterisk v22 allows a remote attacker to execute arbitrary code via the action_createconfig function. NOTE: this is disputed by the Supplier because the impact is limited to creating empty files outside of the Asterisk product directory (aka directory traversal) and the attack can only be performed by a privileged user who has the ability to manage the configuration.

CVSS3: 9.8
nvd
около 1 года назад

Insecure Permissions vulnerability in asterisk v22 allows a remote attacker to execute arbitrary code via the action_createconfig function. NOTE: this is disputed by the Supplier because the impact is limited to creating empty files outside of the Asterisk product directory (aka directory traversal) and the attack can only be performed by a privileged user who has the ability to manage the configuration.

CVSS3: 9.8
github
около 1 года назад

Insecure Permissions vulnerability in asterisk v22 allows a remote attacker to execute arbitrary code via the action_createconfig function