8.8
CVE-2024-42365
- EPSS 34.24%
- Published 08.08.2024 17:15:19
- Last modified 16.09.2024 20:23:18
- Source security-advisories@github.com
- Teams watchlist Login
- Open Login
Asterisk is an open source private branch exchange (PBX) and telephony toolkit. Prior to asterisk versions 18.24.2, 20.9.2, and 21.4.2 and certified-asterisk versions 18.9-cert11 and 20.7-cert2, an AMI user with `write=originate` may change all configuration files in the `/etc/asterisk/` directory. This occurs because they are able to curl remote files and write them to disk, but are also able to append to existing files using the `FILE` function inside the `SET` application. This issue may result in privilege escalation, remote code execution and/or blind server-side request forgery with arbitrary protocol. Asterisk versions 18.24.2, 20.9.2, and 21.4.2 and certified-asterisk versions 18.9-cert11 and 20.7-cert2 contain a fix for this issue.
Data is provided by the National Vulnerability Database (NVD)
Asterisk ≫ Certified Asterisk Version13.13.0
Asterisk ≫ Certified Asterisk Version13.13.0 Updatecert1
Asterisk ≫ Certified Asterisk Version13.13.0 Updatecert1-rc1
Asterisk ≫ Certified Asterisk Version13.13.0 Updatecert1-rc2
Asterisk ≫ Certified Asterisk Version13.13.0 Updatecert1-rc3
Asterisk ≫ Certified Asterisk Version13.13.0 Updatecert1-rc4
Asterisk ≫ Certified Asterisk Version13.13.0 Updatecert2
Asterisk ≫ Certified Asterisk Version13.13.0 Updatecert3
Asterisk ≫ Certified Asterisk Version13.13.0 Updaterc1
Asterisk ≫ Certified Asterisk Version13.13.0 Updaterc2
Asterisk ≫ Certified Asterisk Version16.8 Updatecert1-rc1
Asterisk ≫ Certified Asterisk Version16.8 Updatecert1-rc2
Asterisk ≫ Certified Asterisk Version16.8 Updatecert1-rc3
Asterisk ≫ Certified Asterisk Version16.8 Updatecert1-rc4
Asterisk ≫ Certified Asterisk Version16.8 Updatecert1-rc5
Asterisk ≫ Certified Asterisk Version16.8 Updatecert10
Asterisk ≫ Certified Asterisk Version16.8 Updatecert11
Asterisk ≫ Certified Asterisk Version16.8 Updatecert12
Asterisk ≫ Certified Asterisk Version16.8 Updatecert13
Asterisk ≫ Certified Asterisk Version16.8 Updatecert14
Asterisk ≫ Certified Asterisk Version16.8 Updatecert4-rc1
Asterisk ≫ Certified Asterisk Version16.8 Updatecert4-rc2
Asterisk ≫ Certified Asterisk Version16.8 Updatecert4-rc3
Asterisk ≫ Certified Asterisk Version16.8 Updatecert4-rc4
Asterisk ≫ Certified Asterisk Version16.8.0 Update-
Asterisk ≫ Certified Asterisk Version16.8.0 Updatecert1
Asterisk ≫ Certified Asterisk Version16.8.0 Updatecert10
Asterisk ≫ Certified Asterisk Version16.8.0 Updatecert11
Asterisk ≫ Certified Asterisk Version16.8.0 Updatecert12
Asterisk ≫ Certified Asterisk Version16.8.0 Updatecert2
Asterisk ≫ Certified Asterisk Version16.8.0 Updatecert3
Asterisk ≫ Certified Asterisk Version16.8.0 Updatecert4
Asterisk ≫ Certified Asterisk Version16.8.0 Updatecert5
Asterisk ≫ Certified Asterisk Version16.8.0 Updatecert6
Asterisk ≫ Certified Asterisk Version16.8.0 Updatecert7
Asterisk ≫ Certified Asterisk Version16.8.0 Updatecert8
Asterisk ≫ Certified Asterisk Version16.8.0 Updatecert9
Asterisk ≫ Certified Asterisk Version18.9 Updatecert1
Asterisk ≫ Certified Asterisk Version18.9 Updatecert1-rc1
Asterisk ≫ Certified Asterisk Version18.9 Updatecert10
Asterisk ≫ Certified Asterisk Version18.9 Updatecert2
Asterisk ≫ Certified Asterisk Version18.9 Updatecert3
Asterisk ≫ Certified Asterisk Version18.9 Updatecert4
Asterisk ≫ Certified Asterisk Version18.9 Updatecert5
Asterisk ≫ Certified Asterisk Version18.9 Updatecert6
Asterisk ≫ Certified Asterisk Version18.9 Updatecert7
Asterisk ≫ Certified Asterisk Version18.9 Updatecert8
Asterisk ≫ Certified Asterisk Version18.9 Updatecert8-rc1
Asterisk ≫ Certified Asterisk Version18.9 Updatecert8-rc2
Asterisk ≫ Certified Asterisk Version18.9 Updatecert9
Asterisk ≫ Certified Asterisk Version20.7 Updatecert1
Asterisk ≫ Certified Asterisk Version20.7 Updatecert1-rc1
Asterisk ≫ Certified Asterisk Version20.7 Updatecert1-rc2
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
Type | Source | Score | Percentile |
---|---|---|---|
EPSS | FIRST.org | 34.24% | 0.969 |
Source | Base Score | Exploit Score | Impact Score | Vector string |
---|---|---|---|---|
nvd@nist.gov | 8.8 | 2.8 | 5.9 |
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
|
security-advisories@github.com | 7.4 | 3.1 | 3.7 |
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:L
|
CWE-1220 Insufficient Granularity of Access Control
The product implements access controls via a policy or other feature with the intention to disable or restrict accesses (reads and/or writes) to assets in a system from untrusted agents. However, implemented access controls lack required granularity, which renders the control policy too broad because it allows accesses from unauthorized agents to the security-sensitive assets.
CWE-267 Privilege Defined With Unsafe Actions
A particular privilege, role, capability, or right can be used to perform unsafe actions that were not intended, even when it is assigned to the correct entity.