Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-669m-w7rg-f3xx

Опубликовано: 01 мая 2022
Источник: github
Github: Не прошло ревью

Описание

Asterisk 1.2.10 supports the use of client-controlled variables to determine filenames in the Record function, which allows remote attackers to (1) execute code via format string specifiers or (2) overwrite files via directory traversals involving unspecified vectors, as demonstrated by the CALLERIDNAME variable.

Asterisk 1.2.10 supports the use of client-controlled variables to determine filenames in the Record function, which allows remote attackers to (1) execute code via format string specifiers or (2) overwrite files via directory traversals involving unspecified vectors, as demonstrated by the CALLERIDNAME variable.

EPSS

Процентиль: 84%
0.02329
Низкий

Связанные уязвимости

ubuntu
около 19 лет назад

Asterisk 1.2.10 supports the use of client-controlled variables to determine filenames in the Record function, which allows remote attackers to (1) execute code via format string specifiers or (2) overwrite files via directory traversals involving unspecified vectors, as demonstrated by the CALLERIDNAME variable.

nvd
около 19 лет назад

Asterisk 1.2.10 supports the use of client-controlled variables to determine filenames in the Record function, which allows remote attackers to (1) execute code via format string specifiers or (2) overwrite files via directory traversals involving unspecified vectors, as demonstrated by the CALLERIDNAME variable.

debian
около 19 лет назад

Asterisk 1.2.10 supports the use of client-controlled variables to det ...

EPSS

Процентиль: 84%
0.02329
Низкий