cve/2023/CVE-2023-49294.md

18 lines
1.0 KiB
Markdown
Raw Normal View History

2024-05-25 21:48:12 +02:00
### [CVE-2023-49294](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-49294)
![](https://img.shields.io/static/v1?label=Product&message=asterisk&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=%3D%20%3C%2018.20.1%20&color=brighgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20('Path%20Traversal')&color=brighgreen)
### Description
Asterisk is an open source private branch exchange and telephony toolkit. In Asterisk prior to versions 18.20.1, 20.5.1, and 21.0.1, as well as certified-asterisk prior to 18.9-cert6, it is possible to read any arbitrary file even when the `live_dangerously` is not enabled. This allows arbitrary files to be read. Asterisk versions 18.20.1, 20.5.1, and 21.0.1, as well as certified-asterisk prior to 18.9-cert6, contain a fix for this issue.
### POC
#### Reference
- https://github.com/asterisk/asterisk/security/advisories/GHSA-8857-hfmw-vg8f
#### Github
No PoCs found on GitHub currently.