9.8

CVE-2022-26651

An issue was discovered in Asterisk through 19.x and Certified Asterisk through 16.8-cert13. The func_odbc module provides possibly inadequate escaping functionality for backslash characters in SQL queries, resulting in user-provided data creating a broken SQL query or possibly a SQL injection. This is fixed in 16.25.2, 18.11.2, and 19.3.2, and 16.8-cert14.

Daten sind bereitgestellt durch National Vulnerability Database (NVD)
DigiumAsterisk Version >= 16.0.0 < 16.25.2
DigiumAsterisk Version >= 18.0 < 18.11.2
DigiumAsterisk Version >= 19.0.0 < 19.3.2
DigiumCertified Asterisk Version16.8 Update-
DigiumCertified Asterisk Version16.8 Updatecert1-rc1
DigiumCertified Asterisk Version16.8 Updatecert1-rc2
DigiumCertified Asterisk Version16.8 Updatecert1-rc3
DigiumCertified Asterisk Version16.8 Updatecert1-rc4
DigiumCertified Asterisk Version16.8 Updatecert10
DigiumCertified Asterisk Version16.8 Updatecert11
DigiumCertified Asterisk Version16.8 Updatecert12
DigiumCertified Asterisk Version16.8 Updatecert13
DigiumCertified Asterisk Version16.8 Updatecert2
DigiumCertified Asterisk Version16.8 Updatecert3
DigiumCertified Asterisk Version16.8 Updatecert4
DigiumCertified Asterisk Version16.8 Updatecert4-rc1
DigiumCertified Asterisk Version16.8 Updatecert4-rc2
DigiumCertified Asterisk Version16.8 Updatecert4-rc3
DigiumCertified Asterisk Version16.8 Updatecert4-rc4
DigiumCertified Asterisk Version16.8 Updatecert5
DigiumCertified Asterisk Version16.8 Updatecert6
DigiumCertified Asterisk Version16.8 Updatecert7
DigiumCertified Asterisk Version16.8 Updatecert8
DigiumCertified Asterisk Version16.8 Updatecert9
DebianDebian Linux Version10.0
DebianDebian Linux Version11.0
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Typ Quelle Score Percentile
EPSS FIRST.org 0.18% 0.4
CVSS Metriken
Quelle Base Score Exploit Score Impact Score Vector String
nvd@nist.gov 9.8 3.9 5.9
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
nvd@nist.gov 7.5 10 6.4
AV:N/AC:L/Au:N/C:P/I:P/A:P
CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')

The product constructs all or part of an SQL command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended SQL command when it is sent to a downstream component. Without sufficient removal or quoting of SQL syntax in user-controllable inputs, the generated SQL query can cause those inputs to be interpreted as SQL instead of ordinary user data.