8.8

CVE-2024-42365

Exploit

Asterisk is an open source private branch exchange (PBX) and telephony toolkit. Prior to asterisk versions 18.24.2, 20.9.2, and 21.4.2 and certified-asterisk versions 18.9-cert11 and 20.7-cert2, an AMI user with `write=originate` may change all configuration files in the `/etc/asterisk/` directory. This occurs because they are able to curl remote files and write them to disk, but are also able to append to existing files using the `FILE` function inside the `SET` application. This issue may result in privilege escalation, remote code execution and/or blind server-side request forgery with arbitrary protocol. Asterisk versions 18.24.2, 20.9.2, and 21.4.2 and certified-asterisk versions 18.9-cert11 and 20.7-cert2 contain a fix for this issue.

Data is provided by the National Vulnerability Database (NVD)
AsteriskAsterisk Version < 18.24.2
AsteriskAsterisk Version >= 19.0.0 < 20.9.1
AsteriskAsterisk Version21.4.0
AsteriskCertified Asterisk Version13.13.0
AsteriskCertified Asterisk Version13.13.0 Updatecert1
AsteriskCertified Asterisk Version13.13.0 Updatecert1-rc1
AsteriskCertified Asterisk Version13.13.0 Updatecert1-rc2
AsteriskCertified Asterisk Version13.13.0 Updatecert1-rc3
AsteriskCertified Asterisk Version13.13.0 Updatecert1-rc4
AsteriskCertified Asterisk Version13.13.0 Updatecert2
AsteriskCertified Asterisk Version13.13.0 Updatecert3
AsteriskCertified Asterisk Version13.13.0 Updaterc1
AsteriskCertified Asterisk Version13.13.0 Updaterc2
AsteriskCertified Asterisk Version16.8 Updatecert1-rc1
AsteriskCertified Asterisk Version16.8 Updatecert1-rc2
AsteriskCertified Asterisk Version16.8 Updatecert1-rc3
AsteriskCertified Asterisk Version16.8 Updatecert1-rc4
AsteriskCertified Asterisk Version16.8 Updatecert1-rc5
AsteriskCertified Asterisk Version16.8 Updatecert10
AsteriskCertified Asterisk Version16.8 Updatecert11
AsteriskCertified Asterisk Version16.8 Updatecert12
AsteriskCertified Asterisk Version16.8 Updatecert13
AsteriskCertified Asterisk Version16.8 Updatecert14
AsteriskCertified Asterisk Version16.8 Updatecert4-rc1
AsteriskCertified Asterisk Version16.8 Updatecert4-rc2
AsteriskCertified Asterisk Version16.8 Updatecert4-rc3
AsteriskCertified Asterisk Version16.8 Updatecert4-rc4
AsteriskCertified Asterisk Version16.8.0 Update-
AsteriskCertified Asterisk Version16.8.0 Updatecert1
AsteriskCertified Asterisk Version16.8.0 Updatecert10
AsteriskCertified Asterisk Version16.8.0 Updatecert11
AsteriskCertified Asterisk Version16.8.0 Updatecert12
AsteriskCertified Asterisk Version16.8.0 Updatecert2
AsteriskCertified Asterisk Version16.8.0 Updatecert3
AsteriskCertified Asterisk Version16.8.0 Updatecert4
AsteriskCertified Asterisk Version16.8.0 Updatecert5
AsteriskCertified Asterisk Version16.8.0 Updatecert6
AsteriskCertified Asterisk Version16.8.0 Updatecert7
AsteriskCertified Asterisk Version16.8.0 Updatecert8
AsteriskCertified Asterisk Version16.8.0 Updatecert9
AsteriskCertified Asterisk Version18.9 Updatecert1
AsteriskCertified Asterisk Version18.9 Updatecert1-rc1
AsteriskCertified Asterisk Version18.9 Updatecert10
AsteriskCertified Asterisk Version18.9 Updatecert2
AsteriskCertified Asterisk Version18.9 Updatecert3
AsteriskCertified Asterisk Version18.9 Updatecert4
AsteriskCertified Asterisk Version18.9 Updatecert5
AsteriskCertified Asterisk Version18.9 Updatecert6
AsteriskCertified Asterisk Version18.9 Updatecert7
AsteriskCertified Asterisk Version18.9 Updatecert8
AsteriskCertified Asterisk Version18.9 Updatecert8-rc1
AsteriskCertified Asterisk Version18.9 Updatecert8-rc2
AsteriskCertified Asterisk Version18.9 Updatecert9
AsteriskCertified Asterisk Version20.7 Updatecert1
AsteriskCertified Asterisk Version20.7 Updatecert1-rc1
AsteriskCertified Asterisk Version20.7 Updatecert1-rc2
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Type Source Score Percentile
EPSS FIRST.org 34.24% 0.969
CVSS Metriken
Source Base Score Exploit Score Impact Score Vector string
nvd@nist.gov 8.8 2.8 5.9
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
security-advisories@github.com 7.4 3.1 3.7
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:L
CWE-1220 Insufficient Granularity of Access Control

The product implements access controls via a policy or other feature with the intention to disable or restrict accesses (reads and/or writes) to assets in a system from untrusted agents. However, implemented access controls lack required granularity, which renders the control policy too broad because it allows accesses from unauthorized agents to the security-sensitive assets.

CWE-267 Privilege Defined With Unsafe Actions

A particular privilege, role, capability, or right can be used to perform unsafe actions that were not intended, even when it is assigned to the correct entity.