Lucene search

K
nvd[email protected]NVD:CVE-2024-42365
HistoryAug 08, 2024 - 5:15 p.m.

CVE-2024-42365

2024-08-0817:15:19
CWE-1220
CWE-267
web.nvd.nist.gov
2
asterisk
vulnerability
ami user
privilege escalation
remote code execution

CVSS3

8.8

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

EPSS

0.002

Percentile

59.1%

Asterisk is an open source private branch exchange (PBX) and telephony toolkit. Prior to asterisk versions 18.24.2, 20.9.2, and 21.4.2 and certified-asterisk versions 18.9-cert11 and 20.7-cert2, an AMI user with write=originate may change all configuration files in the /etc/asterisk/ directory. This occurs because they are able to curl remote files and write them to disk, but are also able to append to existing files using the FILE function inside the SET application. This issue may result in privilege escalation, remote code execution and/or blind server-side request forgery with arbitrary protocol. Asterisk versions 18.24.2, 20.9.2, and 21.4.2 and certified-asterisk versions 18.9-cert11 and 20.7-cert2 contain a fix for this issue.

Affected configurations

Nvd
Node
asteriskasteriskRange<18.24.2
OR
asteriskasteriskRange19.0.020.9.1
OR
asteriskasteriskMatch21.4.0
Node
asteriskcertified_asteriskMatch13.13.0
OR
asteriskcertified_asteriskMatch13.13.0cert1
OR
asteriskcertified_asteriskMatch13.13.0cert1-rc1
OR
asteriskcertified_asteriskMatch13.13.0cert1-rc2
OR
asteriskcertified_asteriskMatch13.13.0cert1-rc3
OR
asteriskcertified_asteriskMatch13.13.0cert1-rc4
OR
asteriskcertified_asteriskMatch13.13.0cert2
OR
asteriskcertified_asteriskMatch13.13.0cert3
OR
asteriskcertified_asteriskMatch13.13.0rc1
OR
asteriskcertified_asteriskMatch13.13.0rc2
OR
asteriskcertified_asteriskMatch16.8cert1-rc1
OR
asteriskcertified_asteriskMatch16.8cert1-rc2
OR
asteriskcertified_asteriskMatch16.8cert1-rc3
OR
asteriskcertified_asteriskMatch16.8cert1-rc4
OR
asteriskcertified_asteriskMatch16.8cert1-rc5
OR
asteriskcertified_asteriskMatch16.8cert10
OR
asteriskcertified_asteriskMatch16.8cert11
OR
asteriskcertified_asteriskMatch16.8cert12
OR
asteriskcertified_asteriskMatch16.8cert13
OR
asteriskcertified_asteriskMatch16.8cert14
OR
asteriskcertified_asteriskMatch16.8cert4-rc1
OR
asteriskcertified_asteriskMatch16.8cert4-rc2
OR
asteriskcertified_asteriskMatch16.8cert4-rc3
OR
asteriskcertified_asteriskMatch16.8cert4-rc4
OR
asteriskcertified_asteriskMatch16.8.0-
OR
asteriskcertified_asteriskMatch16.8.0cert1
OR
asteriskcertified_asteriskMatch16.8.0cert10
OR
asteriskcertified_asteriskMatch16.8.0cert11
OR
asteriskcertified_asteriskMatch16.8.0cert12
OR
asteriskcertified_asteriskMatch16.8.0cert2
OR
asteriskcertified_asteriskMatch16.8.0cert3
OR
asteriskcertified_asteriskMatch16.8.0cert4
OR
asteriskcertified_asteriskMatch16.8.0cert5
OR
asteriskcertified_asteriskMatch16.8.0cert6
OR
asteriskcertified_asteriskMatch16.8.0cert7
OR
asteriskcertified_asteriskMatch16.8.0cert8
OR
asteriskcertified_asteriskMatch16.8.0cert9
OR
asteriskcertified_asteriskMatch18.9cert1
OR
asteriskcertified_asteriskMatch18.9cert1-rc1
OR
asteriskcertified_asteriskMatch18.9cert10
OR
asteriskcertified_asteriskMatch18.9cert2
OR
asteriskcertified_asteriskMatch18.9cert3
OR
asteriskcertified_asteriskMatch18.9cert4
OR
asteriskcertified_asteriskMatch18.9cert5
OR
asteriskcertified_asteriskMatch18.9cert6
OR
asteriskcertified_asteriskMatch18.9cert7
OR
asteriskcertified_asteriskMatch18.9cert8
OR
asteriskcertified_asteriskMatch18.9cert8-rc1
OR
asteriskcertified_asteriskMatch18.9cert8-rc2
OR
asteriskcertified_asteriskMatch18.9cert9
OR
asteriskcertified_asteriskMatch20.7cert1
OR
asteriskcertified_asteriskMatch20.7cert1-rc1
OR
asteriskcertified_asteriskMatch20.7cert1-rc2
VendorProductVersionCPE
asteriskasterisk*cpe:2.3:a:asterisk:asterisk:*:*:*:*:*:*:*:*
asteriskasterisk21.4.0cpe:2.3:a:asterisk:asterisk:21.4.0:*:*:*:*:*:*:*
asteriskcertified_asterisk13.13.0cpe:2.3:a:asterisk:certified_asterisk:13.13.0:*:*:*:*:*:*:*
asteriskcertified_asterisk13.13.0cpe:2.3:a:asterisk:certified_asterisk:13.13.0:cert1:*:*:*:*:*:*
asteriskcertified_asterisk13.13.0cpe:2.3:a:asterisk:certified_asterisk:13.13.0:cert1-rc1:*:*:*:*:*:*
asteriskcertified_asterisk13.13.0cpe:2.3:a:asterisk:certified_asterisk:13.13.0:cert1-rc2:*:*:*:*:*:*
asteriskcertified_asterisk13.13.0cpe:2.3:a:asterisk:certified_asterisk:13.13.0:cert1-rc3:*:*:*:*:*:*
asteriskcertified_asterisk13.13.0cpe:2.3:a:asterisk:certified_asterisk:13.13.0:cert1-rc4:*:*:*:*:*:*
asteriskcertified_asterisk13.13.0cpe:2.3:a:asterisk:certified_asterisk:13.13.0:cert2:*:*:*:*:*:*
asteriskcertified_asterisk13.13.0cpe:2.3:a:asterisk:certified_asterisk:13.13.0:cert3:*:*:*:*:*:*
Rows per page:
1-10 of 551

CVSS3

8.8

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

EPSS

0.002

Percentile

59.1%