CVE-2022-42706Path Traversal in Asterisk

CWE-22Path Traversal4 documents4 sources
Severity
4.9MEDIUMNVD
EPSS
0.8%
top 25.74%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedDec 5

Description

An issue was discovered in Sangoma Asterisk through 16.28, 17 and 18 through 18.14, 19 through 19.6, and certified through 18.9-cert1. GetConfig, via Asterisk Manager Interface, allows a connected application to access files outside of the asterisk configuration directory, aka Directory Traversal.

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:NExploitability: 1.2 | Impact: 3.6

Affected Packages4 packages

NVDsangoma/asterisk16.0.016.29.1+3
Debiansangoma/asterisk< 1:16.28.0~dfsg-0+deb11u2
debiandebian/asterisk< asterisk 1:16.28.0~dfsg-0+deb11u2 (bullseye)

Patches

🔴Vulnerability Details

2
GHSA
GHSA-phq9-6f4r-97wc: An issue was discovered in Sangoma Asterisk through 162022-12-05
OSV
CVE-2022-42706: An issue was discovered in Sangoma Asterisk through 162022-12-05

📋Vendor Advisories

1
Debian
CVE-2022-42706: asterisk - An issue was discovered in Sangoma Asterisk through 16.28, 17 and 18 through 18....2022
CVE-2022-42706 — Path Traversal in Sangoma Asterisk | cvebase