An issue was discovered in manager.c in Sangoma Asterisk through 13.x, 16.x, 17.x and Certified Asterisk 13.21 through 13.21-cert4. A remote authenticated Asterisk Manager Interface (AMI) user without system authorization could use a specially crafted Originate AMI request to execute arbitrary system commands.
The product does not perform an authorization check when an actor attempts to access a resource or perform an action.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Asterisk | Digium | 13.0.0 (including) | 13.29.2 (excluding) |
Asterisk | Digium | 16.0.0 (including) | 16.6.2 (excluding) |
Asterisk | Digium | 17.0.0 (including) | 17.0.1 (excluding) |
Certified_asterisk | Digium | 13.21.0 (including) | 13.21.0 (including) |
Certified_asterisk | Digium | 13.21.0-cert1 (including) | 13.21.0-cert1 (including) |
Certified_asterisk | Digium | 13.21.0-cert2 (including) | 13.21.0-cert2 (including) |
Certified_asterisk | Digium | 13.21.0-cert3 (including) | 13.21.0-cert3 (including) |
Certified_asterisk | Digium | 13.21.0-cert4 (including) | 13.21.0-cert4 (including) |
Certified_asterisk | Digium | 13.21.0-rc1 (including) | 13.21.0-rc1 (including) |
Asterisk | Ubuntu | bionic | * |
Asterisk | Ubuntu | disco | * |
Asterisk | Ubuntu | eoan | * |
Asterisk | Ubuntu | focal | * |
Asterisk | Ubuntu | trusty | * |
Asterisk | Ubuntu | xenial | * |