Edit Report

Our sensors found this exploit at:

Below is a copy:

ID     :              2006.1
Product :          ARI (Asterisk Recording Interface)
                        [email protected] Distribution
Affected product : <= 0.7.15 ([email protected] 2.6 and lower)
Class :              Access to protected information, directory traversal
Remote :          yes
Author :           Francois Harvey <fharvey at securiweb dot net>
Published date :   2006-04-20 (Initial Vendor contact 2006-03-06)
Reference URL :
Solution :         Use the last ARI version or use [email protected] 2.8

Two vulnerabilities was found in the ARI package included in the  
[email protected] Distribution. These vulnerabilities allow a user to listen 
voicemail from any other users and and to disclose configuration password.

Vulnerability 1

The config file is in a public directory and not protected by default

Exploit : http://<asterisk>/recordings/includes/main.conf

This should list all the configuration of ARI. With asterisk password, 
db password, admin password.

Vulnerability 2

A directory traversal/file retreival exist in the ARI web interface.
This script allow a user to download any mp3/wav/gsm on the system. No 
authentification is needed, this can be used to listen voicemail from 
another user.

Exploit : 

This flaw can also be used to verify the presence of a file on the server
Cannot use file: xxx <-- file exist bot not the good extension
404 File not found! <--- file doesn't exist

Both [email protected] and ARI released fixes

Francois Harvey <fharvey at securiweb dot net>
SecuriWeb inc |

Copyright ©2023 Exploitalert.

All trademarks used are properties of their respective owners. By visiting this website you agree to Terms of Use.