Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-3h3j-j53r-q78w

Опубликовано: 01 мая 2022
Источник: github
Github: Не прошло ревью

Описание

Asterisk Open Source 1.2.x before 1.2.26 and 1.4.x before 1.4.16, and Business Edition B.x.x before B.2.3.6 and C.x.x before C.1.0-beta8, when using database-based registrations ("realtime") and host-based authentication, does not check the IP address when the username is correct and there is no password, which allows remote attackers to bypass authentication using a valid username.

Asterisk Open Source 1.2.x before 1.2.26 and 1.4.x before 1.4.16, and Business Edition B.x.x before B.2.3.6 and C.x.x before C.1.0-beta8, when using database-based registrations ("realtime") and host-based authentication, does not check the IP address when the username is correct and there is no password, which allows remote attackers to bypass authentication using a valid username.

EPSS

Процентиль: 69%
0.00617
Низкий

Дефекты

CWE-287

Связанные уязвимости

ubuntu
около 18 лет назад

Asterisk Open Source 1.2.x before 1.2.26 and 1.4.x before 1.4.16, and Business Edition B.x.x before B.2.3.6 and C.x.x before C.1.0-beta8, when using database-based registrations ("realtime") and host-based authentication, does not check the IP address when the username is correct and there is no password, which allows remote attackers to bypass authentication using a valid username.

nvd
около 18 лет назад

Asterisk Open Source 1.2.x before 1.2.26 and 1.4.x before 1.4.16, and Business Edition B.x.x before B.2.3.6 and C.x.x before C.1.0-beta8, when using database-based registrations ("realtime") and host-based authentication, does not check the IP address when the username is correct and there is no password, which allows remote attackers to bypass authentication using a valid username.

debian
около 18 лет назад

Asterisk Open Source 1.2.x before 1.2.26 and 1.4.x before 1.4.16, and ...

EPSS

Процентиль: 69%
0.00617
Низкий

Дефекты

CWE-287