Lucene search

K
securityvulnsSecurityvulnsSECURITYVULNS:DOC:22740
HistoryNov 05, 2009 - 12:00 a.m.

AST-2009-009: Cross-site AJAX request vulnerability

2009-11-0500:00:00
vulners.com
19

EPSS

0.004

Percentile

73.8%

           Asterisk Project Security Advisory - AST-2009-009

±-----------------------------------------------------------------------+
| Product | Asterisk |
|----------------------±------------------------------------------------|
| Summary | Cross-site AJAX request vulnerability |
|----------------------±------------------------------------------------|
| Nature of Advisory | Cross-site AJAX request exploitation |
|----------------------±------------------------------------------------|
| Susceptibility | Remote Unauthenticated Sessions |
|----------------------±------------------------------------------------|
| Severity | Minor |
|----------------------±------------------------------------------------|
| Exploits Known | No |
|----------------------±------------------------------------------------|
| Reported On | October 26, 2009 |
|----------------------±------------------------------------------------|
| Reported By | issues.asterisk.org user jcollie |
|----------------------±------------------------------------------------|
| Posted On | November 4, 2009 |
|----------------------±------------------------------------------------|
| Last Updated On | November 4, 2009 |
|----------------------±------------------------------------------------|
| Advisory Contact | Joshua Colp <jcolp AT digium DOT com> |
|----------------------±------------------------------------------------|
| CVE Name | CVE-2008-7220 |
±-----------------------------------------------------------------------+

±-----------------------------------------------------------------------+
| Description | Asterisk includes a demonstration AJAX based manager |
| | interface, ajamdemo.html which uses the prototype.js |
| | framework. An issue was uncovered in this framework |
| | which could allow someone to execute a cross-site AJAX |
| | request exploit. |
±-----------------------------------------------------------------------+

±-----------------------------------------------------------------------+
| Resolution | Upgrade to one of the versions below, or apply one of the |
| | patches specified in the Patches section. |
±-----------------------------------------------------------------------+

±-----------------------------------------------------------------------+

Affected Versions
Product
----------------------------±--------±--------------------------------
Asterisk Open Source
----------------------------±--------±--------------------------------
Asterisk Open Source
----------------------------±--------±--------------------------------
Asterisk Open Source
----------------------------±--------±--------------------------------
Asterisk Open Source
----------------------------±--------±--------------------------------
Asterisk Addons
----------------------------±--------±--------------------------------
Asterisk Addons
----------------------------±--------±--------------------------------
Asterisk Addons
----------------------------±--------±--------------------------------
Asterisk Business Edition
----------------------------±--------±--------------------------------
Asterisk Business Edition
----------------------------±--------±--------------------------------
Asterisk Business Edition
----------------------------±--------±--------------------------------
AsteriskNOW
----------------------------±--------±--------------------------------
s800i (Asterisk Appliance)
±-----------------------------------------------------------------------+

±-----------------------------------------------------------------------+

Corrected In
Product
--------------------------------------------±--------------------------
Asterisk Open Source
--------------------------------------------±--------------------------
Asterisk Open Source
--------------------------------------------±--------------------------
Asterisk Open Source
--------------------------------------------±--------------------------
Asterisk Business Edition
--------------------------------------------±--------------------------
Asterisk Business Edition
--------------------------------------------±--------------------------
Asterisk Business Edition
±-----------------------------------------------------------------------+

±-----------------------------------------------------------------------+

Patches
SVN URL
---------------------------------------------------------------±-------
http://downloads.digium.com/pub/asa/AST-2009-009-1.4.diff.txt
---------------------------------------------------------------±-------
http://downloads.digium.com/pub/asa/AST-2009-009-1.6.0.diff.txt
---------------------------------------------------------------±-------
http://downloads.digium.com/pub/asa/AST-2009-009-1.6.1.diff.txt
±-----------------------------------------------------------------------+

±-----------------------------------------------------------------------+
| Links | https://issues.asterisk.org/view.php?id=16139 |
±-----------------------------------------------------------------------+

±-----------------------------------------------------------------------+
| Asterisk Project Security Advisories are posted at |
| http://www.asterisk.org/security |
| |
| This document may be superseded by later versions; if so, the latest |
| version will be posted at |
| http://downloads.digium.com/pub/security/AST-2009-009.pdf and |
| http://downloads.digium.com/pub/security/AST-2009-009.html |
±-----------------------------------------------------------------------+

±-----------------------------------------------------------------------+

Revision History
Date
-----------------------±------------------±---------------------------
October 29, 2009
±-----------------------------------------------------------------------+
           Asterisk Project Security Advisory - AST-2009-009
          Copyright &#40;c&#41; 2009 Digium, Inc. All Rights Reserved.

Permission is hereby granted to distribute and publish this advisory in its
original, unaltered form.