Vulnerabilities > CVE-2006-2021 - Information Disclosure vulnerability in Asterisk Recording Interface
Attack vector
NETWORK Attack complexity
LOW Privileges required
NONE Confidentiality impact
PARTIAL Integrity impact
NONE Availability impact
NONE Summary
Absolute path traversal vulnerability in recordings/misc/audio.php in the Asterisk Recording Interface (ARI) web interface in Asterisk@Home before 2.8 allows remote attackers to read arbitrary MP3, WAV, and GSM files via a full pathname in the recording parameter. NOTE: this issue can also be used to determine existence of files. This vulnerability is addressed in the following product release: Asterisk@Home, Asterisk@Home, 2.8
Vulnerable Configurations
Part | Description | Count |
---|---|---|
Application | 1 |
Nessus
NASL family | CGI abuses |
NASL id | ASTERISK_RECORDING_INFO_DISCLOSURE.NASL |
description | The remote host is running Asterisk Recording Interface (ARI), a web-based portal for the Asterisk PBX software. The version of ARI installed on the remote host reportedly allows an unauthenticated attacker to retrieve arbitrary sound files, such as voicemail messages, and to determine the existence of other files on the remote host by passing a specially crafted path to the |
last seen | 2020-06-01 |
modified | 2020-06-02 |
plugin id | 21304 |
published | 2006-05-03 |
reporter | This script is Copyright (C) 2006-2018 Tenable Network Security, Inc. |
source | https://www.tenable.com/plugins/nessus/21304 |
title | Asterisk Recording Interface (ARI) misc/audio.php recording Parameter Traversal Arbitrary File Access |
code |
|
References
- http://secunia.com/advisories/19744
- http://securityreason.com/securityalert/750
- http://www.osvdb.org/24806
- http://www.securityfocus.com/archive/1/431655/100/0/threaded
- http://www.securityfocus.com/bid/17641
- http://www.securiweb.net/wiki/Ressources/AvisDeSecurite/2006.1
- http://www.vupen.com/english/advisories/2006/1457
- https://exchange.xforce.ibmcloud.com/vulnerabilities/25996