Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-jr9f-93rq-w256

Опубликовано: 01 мая 2022
Источник: github
Github: Не прошло ревью

Описание

Absolute path traversal vulnerability in recordings/misc/audio.php in the Asterisk Recording Interface (ARI) web interface in Asterisk@Home before 2.8 allows remote attackers to read arbitrary MP3, WAV, and GSM files via a full pathname in the recording parameter. NOTE: this issue can also be used to determine existence of files.

Absolute path traversal vulnerability in recordings/misc/audio.php in the Asterisk Recording Interface (ARI) web interface in Asterisk@Home before 2.8 allows remote attackers to read arbitrary MP3, WAV, and GSM files via a full pathname in the recording parameter. NOTE: this issue can also be used to determine existence of files.

EPSS

Процентиль: 72%
0.00713
Низкий

Связанные уязвимости

nvd
почти 20 лет назад

Absolute path traversal vulnerability in recordings/misc/audio.php in the Asterisk Recording Interface (ARI) web interface in Asterisk@Home before 2.8 allows remote attackers to read arbitrary MP3, WAV, and GSM files via a full pathname in the recording parameter. NOTE: this issue can also be used to determine existence of files.

EPSS

Процентиль: 72%
0.00713
Низкий