ID CVE-2006-2021
Summary Absolute path traversal vulnerability in recordings/misc/audio.php in the Asterisk Recording Interface (ARI) web interface in Asterisk@Home before 2.8 allows remote attackers to read arbitrary MP3, WAV, and GSM files via a full pathname in the recording parameter. NOTE: this issue can also be used to determine existence of files. This vulnerability is addressed in the following product release: Asterisk@Home, Asterisk@Home, 2.8
References
Vulnerable Configurations
  • cpe:2.3:a:asteriskathome:asteriskathome:*:*:*:*:*:*:*:*
    cpe:2.3:a:asteriskathome:asteriskathome:*:*:*:*:*:*:*:*
CVSS
Base: 5.0 (as of 18-10-2018 - 16:37)
Impact:
Exploitability:
CWE NVD-CWE-Other
CAPEC
Access
VectorComplexityAuthentication
NETWORK LOW NONE
Impact
ConfidentialityIntegrityAvailability
PARTIAL NONE NONE
cvss-vector via4 AV:N/AC:L/Au:N/C:P/I:N/A:N
refmap via4
bid 17641
bugtraq 20060421 [SecuriWeb 2006.1] directory traversal in Asterisk@Home and ARI
misc http://www.securiweb.net/wiki/Ressources/AvisDeSecurite/2006.1
osvdb 24806
secunia 19744
sreason 750
vupen ADV-2006-1457
xf asterisk-audio-directory-traversal(25996)
Last major update 18-10-2018 - 16:37
Published 25-04-2006 - 20:06
Last modified 18-10-2018 - 16:37
Back to Top