Описание
A local privilege escalation vulnerability exists in the safe_asterisk script included with the Asterisk toolkit package. When Asterisk is started via this script (common in SysV init or FreePBX environments), it sources all .sh files located in /etc/asterisk/startup.d/ as root, without validating ownership or permissions. Non-root users with legitimate write access to /etc/asterisk can exploit this behaviour by placing malicious scripts in the startup.d directory, which will then execute with root privileges upon service restart.
| Релиз | Статус | Примечание |
|---|---|---|
| devel | not-affected | 1:22.5.2~dfsg+~cs6.15.60671435-1 |
| esm-apps/bionic | needs-triage | |
| esm-apps/focal | needs-triage | |
| esm-apps/jammy | needs-triage | |
| esm-apps/noble | needs-triage | |
| esm-apps/xenial | needs-triage | |
| jammy | needs-triage | |
| noble | needs-triage | |
| plucky | ignored | end of life, was needs-triage |
| questing | not-affected | 1:22.5.2~dfsg+~cs6.15.60671435-1 |
Показывать по
Ссылки на источники
7.8 High
CVSS3
Связанные уязвимости
A local privilege escalation vulnerability exists in the safe_asterisk script included with the Asterisk toolkit package. When Asterisk is started via this script (common in SysV init or FreePBX environments), it sources all .sh files located in /etc/asterisk/startup.d/ as root, without validating ownership or permissions. Non-root users with legitimate write access to /etc/asterisk can exploit this behaviour by placing malicious scripts in the startup.d directory, which will then execute with root privileges upon service restart.
A local privilege escalation vulnerability exists in the safe_asterisk ...
Уязвимость сценария safe_asterisk (/usr/sbin/safe_asterisk) системы управления IP-телефонией Asterisk, позволяющая нарушителю повысить свои привилегии
7.8 High
CVSS3