Advertisement






directory traversal in Asterisk@Home and ARI

CVE Category Price Severity
CVE-2019-15226 CWE-22 $500 High
Author Risk Exploitation Type Date
Unknown High Remote 2006-04-22
CVSS EPSS EPSSP
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:N 0.02192 0.50148

CVSS vector description

Our sensors found this exploit at: http://cxsecurity.com/ascii/WLB-2006040075

Below is a copy:

ID     :              2006.1
Product :          ARI (Asterisk Recording Interface)
                        http://www.littlejohnconsulting.com/?q=node/11
                        Asterisk@home Distribution
                        http://asteriskathome.sourceforge.net/
Affected product : <= 0.7.15 (Asterisk@Home 2.6 and lower)
Class :              Access to protected information, directory traversal
Remote :          yes
Author :           Francois Harvey <fharvey at securiweb dot net>
Published date :   2006-04-20 (Initial Vendor contact 2006-03-06)
Reference URL :  
http://www.securiweb.net/wiki/Ressources/AvisDeSecurite/2006.1
Solution :         Use the last ARI version or use asterisk@home 2.8

Two vulnerabilities was found in the ARI package included in the  
asterisk@home Distribution. These vulnerabilities allow a user to listen 
voicemail from any other users and and to disclose configuration password.

Vulnerability 1
---------------

The config file is in a public directory and not protected by default

Exploit : http://<asterisk>/recordings/includes/main.conf

This should list all the configuration of ARI. With asterisk password, 
db password, admin password.

Vulnerability 2
---------------

A directory traversal/file retreival exist in the ARI web interface.
This script allow a user to download any mp3/wav/gsm on the system. No 
authentification is needed, this can be used to listen voicemail from 
another user.

Exploit : 
http://<asterisk>/recordings/misc/audio.php?recording=/var/spool/asteris
k/voicemail/default/<mailbox>/INBOX/msg<messageid>.wav

This flaw can also be used to verify the presence of a file on the server
Cannot use file: xxx <-- file exist bot not the good extension
404 File not found! <--- file doesn't exist

Patch
------
Both asterisk@home and ARI released fixes

Author
-------
Francois Harvey <fharvey at securiweb dot net>
SecuriWeb inc | www.securiweb.net

Copyright ©2024 Exploitalert.

This information is provided for TESTING and LEGAL RESEARCH purposes only.
All trademarks used are properties of their respective owners. By visiting this website you agree to Terms of Use and Privacy Policy and Impressum