ID | CVE-2024-49215 | ||||||
Summary | An issue was discovered in Sangoma Asterisk through 18.20.0, 19.x and 20.x through 20.5.0, and 21.x through 21.0.0, and Certified Asterisk through 18.9-cert5. In manager.c, the functions action_getconfig() and action_getconfigJson() do not process the input file path, resulting in a path traversal vulnerability. In versions without the restrictedFile() function, no processing is done on the input path. In versions with the restrictedFile() function, path traversal is not processed. | ||||||
References | |||||||
Vulnerable Configurations |
|
||||||
CVSS |
|
||||||
Access |
|
||||||
Impact |
|
||||||
Last major update | 22-10-2024 - 20:35 | ||||||
Published | 21-10-2024 - 01:15 | ||||||
Last modified | 22-10-2024 - 20:35 |