Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2025-1131

Опубликовано: 23 сент. 2025
Источник: debian

Описание

A local privilege escalation vulnerability exists in the safe_asterisk script included with the Asterisk toolkit package. When Asterisk is started via this script (common in SysV init or FreePBX environments), it sources all .sh files located in /etc/asterisk/startup.d/ as root, without validating ownership or permissions. Non-root users with legitimate write access to /etc/asterisk can exploit this behaviour by placing malicious scripts in the startup.d directory, which will then execute with root privileges upon service restart.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
asteriskfixed1:22.5.1~dfsg+~cs6.15.60671435-1package

Примечания

  • https://github.com/asterisk/asterisk/security/advisories/GHSA-v9q8-9j8m-5xwp

  • https://github.com/asterisk/asterisk/commit/f97361952023625e8dd49ca03454777fad19fedb (23.0.0-pre1)

  • https://github.com/asterisk/asterisk/commit/7ba06dc6ee5efd4edfe79690ad8d61a33b92ce3d (22.5.1)

Связанные уязвимости

CVSS3: 7.8
ubuntu
5 месяцев назад

A local privilege escalation vulnerability exists in the safe_asterisk script included with the Asterisk toolkit package. When Asterisk is started via this script (common in SysV init or FreePBX environments), it sources all .sh files located in /etc/asterisk/startup.d/ as root, without validating ownership or permissions. Non-root users with legitimate write access to /etc/asterisk can exploit this behaviour by placing malicious scripts in the startup.d directory, which will then execute with root privileges upon service restart.

CVSS3: 7.8
nvd
5 месяцев назад

A local privilege escalation vulnerability exists in the safe_asterisk script included with the Asterisk toolkit package. When Asterisk is started via this script (common in SysV init or FreePBX environments), it sources all .sh files located in /etc/asterisk/startup.d/ as root, without validating ownership or permissions. Non-root users with legitimate write access to /etc/asterisk can exploit this behaviour by placing malicious scripts in the startup.d directory, which will then execute with root privileges upon service restart.

CVSS3: 8.8
fstec
6 месяцев назад

Уязвимость сценария safe_asterisk (/usr/sbin/safe_asterisk) системы управления IP-телефонией Asterisk, позволяющая нарушителю повысить свои привилегии