An issue was discovered in manager.c in Sangoma Asterisk through 13.x, 16.x, 17.x and Certified Asterisk 13.21 through 13.21-cert4. A remote authenticated Asterisk Manager Interface (AMI) user without system authorization could use a specially crafted Originate AMI request to execute arbitrary system commands.
2019-11-22T18:15:11.030
2024-11-21T04:33:21.593
Modified
CVSSv3.1: 8.8 (HIGH)
AV:N/AC:L/Au:S/C:C/I:C/A:C
8.0
10.0
Type | Vendor | Product | Version/Range | Vulnerable? |
---|---|---|---|---|
Application | digium | asterisk | < 13.29.2 | Yes |
Application | digium | asterisk | < 16.6.2 | Yes |
Application | digium | asterisk | < 17.0.1 | Yes |
Application | digium | certified_asterisk | 13.21.0 | Yes |
Application | digium | certified_asterisk | 13.21.0 | Yes |
Application | digium | certified_asterisk | 13.21.0 | Yes |
Application | digium | certified_asterisk | 13.21.0 | Yes |
Application | digium | certified_asterisk | 13.21.0 | Yes |
Application | digium | certified_asterisk | 13.21.0 | Yes |
Operating System | debian | debian_linux | 8.0 | Yes |
Operating System | debian | debian_linux | 9.0 | Yes |