6.1
CVE-2026-23738
- EPSS 0.05%
- Veröffentlicht 06.02.2026 16:41:43
- Zuletzt bearbeitet 18.02.2026 18:42:48
- Quelle security-advisories@github.com
- CVE-Watchlists
- Unerledigt
Asterisk is an open source private branch exchange and telephony toolkit. Prior to versions 20.7-cert9, 20.18.2, 21.12.1, 22.8.2, and 23.2.2, user supplied/control values for Cookies and any GET variable query Parameter are directly interpolated into the HTML of the page using ast_str_append. The endpoint at GET /httpstatus is the potential vulnerable endpoint relating to asterisk/main /http.c. This issue has been patched in versions 20.7-cert9, 20.18.2, 21.12.1, 22.8.2, and 23.2.2.
Verknüpft mit AI von unstrukturierten Daten zu bestehenden CPE der NVD
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
Sangoma ≫ Certified Asterisk Version <= 18.9
Sangoma ≫ Certified Asterisk Version20.7 Updatecert1
Sangoma ≫ Certified Asterisk Version20.7 Updatecert1-rc1
Sangoma ≫ Certified Asterisk Version20.7 Updatecert1-rc2
Sangoma ≫ Certified Asterisk Version20.7 Updatecert2
Sangoma ≫ Certified Asterisk Version20.7 Updatecert3
Sangoma ≫ Certified Asterisk Version20.7 Updatecert4
Sangoma ≫ Certified Asterisk Version20.7 Updatecert5
Sangoma ≫ Certified Asterisk Version20.7 Updatecert6
Sangoma ≫ Certified Asterisk Version20.7 Updatecert7
Sangoma ≫ Certified Asterisk Version20.7 Updatecert8
| Typ | Quelle | Score | Percentile |
|---|---|---|---|
| EPSS | FIRST.org | 0.05% | 0.147 |
| Quelle | Base Score | Exploit Score | Impact Score | Vector String |
|---|---|---|---|---|
| nvd@nist.gov | 6.1 | 2.8 | 2.7 |
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
|
| security-advisories@github.com | 3.5 | 2.1 | 1.4 |
CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N
|
CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users.