7.5

CVE-2023-49294

Asterisk is an open source private branch exchange and telephony toolkit. In Asterisk prior to versions 18.20.1, 20.5.1, and 21.0.1, as well as certified-asterisk prior to 18.9-cert6, it is possible to read any arbitrary file even when the `live_dangerously` is not enabled. This allows arbitrary files to be read. Asterisk versions 18.20.1, 20.5.1, and 21.0.1, as well as certified-asterisk prior to 18.9-cert6, contain a fix for this issue.

Data is provided by the National Vulnerability Database (NVD)
DigiumAsterisk Version < 18.20.1
DigiumAsterisk Version >= 19.0.0 < 20.5.1
DigiumAsterisk Version21.0.0
SangomaCertified Asterisk Version13.13.0
SangomaCertified Asterisk Version13.13.0 Updatecert1
SangomaCertified Asterisk Version13.13.0 Updatecert1-rc1
SangomaCertified Asterisk Version13.13.0 Updatecert1-rc2
SangomaCertified Asterisk Version13.13.0 Updatecert1-rc3
SangomaCertified Asterisk Version13.13.0 Updatecert1-rc4
SangomaCertified Asterisk Version13.13.0 Updatecert2
SangomaCertified Asterisk Version13.13.0 Updatecert3
SangomaCertified Asterisk Version13.13.0 Updaterc1
SangomaCertified Asterisk Version13.13.0 Updaterc2
SangomaCertified Asterisk Version16.8.0 Update-
SangomaCertified Asterisk Version16.8.0 Updatecert1
SangomaCertified Asterisk Version16.8.0 Updatecert10
SangomaCertified Asterisk Version16.8.0 Updatecert11
SangomaCertified Asterisk Version16.8.0 Updatecert12
SangomaCertified Asterisk Version16.8.0 Updatecert2
SangomaCertified Asterisk Version16.8.0 Updatecert3
SangomaCertified Asterisk Version16.8.0 Updatecert4
SangomaCertified Asterisk Version16.8.0 Updatecert5
SangomaCertified Asterisk Version16.8.0 Updatecert6
SangomaCertified Asterisk Version16.8.0 Updatecert7
SangomaCertified Asterisk Version16.8.0 Updatecert8
SangomaCertified Asterisk Version16.8.0 Updatecert9
SangomaCertified Asterisk Version18.9 Updatecert1
SangomaCertified Asterisk Version18.9 Updatecert2
SangomaCertified Asterisk Version18.9 Updatecert3
SangomaCertified Asterisk Version18.9 Updatecert4
SangomaCertified Asterisk Version18.9 Updatecert5
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Type Source Score Percentile
EPSS FIRST.org 10.36% 0.929
CVSS Metriken
Source Base Score Exploit Score Impact Score Vector string
nvd@nist.gov 7.5 3.9 3.6
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
security-advisories@github.com 4.9 1.2 3.6
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N
CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')

The product uses external input to construct a pathname that is intended to identify a file or directory that is located underneath a restricted parent directory, but the product does not properly neutralize special elements within the pathname that can cause the pathname to resolve to a location that is outside of the restricted directory.