ID CVE-2006-2020
Summary Asterisk Recording Interface (ARI) in Asterisk@Home before 2.8 stores recordings/includes/main.conf under the web document root with insufficient access control, which allows remote attackers to obtain password information. This vulnerability is addressed in the following product releases: Littlejohn Consulting, Asterisk Recording Interface, 0.10.00 and higher
References
Vulnerable Configurations
  • cpe:2.3:a:asteriskathome:asteriskathome:*:*:*:*:*:*:*:*
    cpe:2.3:a:asteriskathome:asteriskathome:*:*:*:*:*:*:*:*
CVSS
Base: 7.8 (as of 18-10-2018 - 16:37)
Impact:
Exploitability:
CWE NVD-CWE-Other
CAPEC
Access
VectorComplexityAuthentication
NETWORK LOW NONE
Impact
ConfidentialityIntegrityAvailability
COMPLETE NONE NONE
cvss-vector via4 AV:N/AC:L/Au:N/C:C/I:N/A:N
refmap via4
bid 17641
bugtraq 20060421 [SecuriWeb 2006.1] directory traversal in Asterisk@Home and ARI
misc http://www.securiweb.net/wiki/Ressources/AvisDeSecurite/2006.1
osvdb 24805
secunia 19744
vupen ADV-2006-1457
xf asterisk-mail-disclose-information(25993)
Last major update 18-10-2018 - 16:37
Published 25-04-2006 - 20:06
Last modified 18-10-2018 - 16:37
Back to Top