Nixpkgs Security Tracker

Login with GitHub

Suggestions search

With package: asterisk_23

Found 5 matching suggestions

Untriaged
created 3 days, 22 hours ago
asterisk allows calls on prohibited networks

asterisk allows calls on prohibited networks

Affected products

asterisk
  • ==All 1.6.1 versions

Matching in nixpkgs

pkgs.asterisk_18

Software implementation of a telephone private branch exchange (PBX)

Package maintainers

Published
updated 2 weeks ago by @LeSuisse Activity log
  • Created automatic suggestion
  • @LeSuisse removed
    5 packages
    • asterisk-module-sccp
    • asterisk-ldap
    • python312Packages.asterisk-mbox
    • python313Packages.asterisk-mbox
    • python314Packages.asterisk-mbox
  • @LeSuisse accepted
  • @LeSuisse published on GitHub
ast_coredumper running as root sources ast_debug_tools.conf from /etc/asterisk; potentially leading to privilege escalation

Asterisk is an open source private branch exchange and telephony toolkit. Prior to versions 20.7-cert9, 20.18.2, 21.12.1, 22.8.2, and 23.2.2, the asterisk/contrib/scripts/ast_coredumper runs as root, as noted by the NOTES tag on line 689 of the ast_coredumper file. The script will source the contents of /etc/asterisk/ast_debug_tools.conf, which resides in a folder that is writeable by the asterisk user:group. Due to the /etc/asterisk/ast_debug_tools.conf file following bash semantics and it being loaded; an attacker with write permissions may add or modify the file such that when the root ast_coredumper is run; it would source and thereby execute arbitrary bash code found in the /etc/asterisk/ast_debug_tools.conf. This issue has been patched in versions 20.7-cert9, 20.18.2, 21.12.1, 22.8.2, and 23.2.2.

Affected products

asterisk
  • ==< 23.2.2
  • ==< 21.12.1
  • ==< 20.7-cert9
  • ==< 20.18.2
  • ==< 22.8.2

Matching in nixpkgs

pkgs.asterisk_18

Software implementation of a telephone private branch exchange (PBX)

Package maintainers

Upstream advisory: https://github.com/asterisk/asterisk/security/advisories/GHSA-rvch-3jmx-3jf3
Published
updated 2 weeks ago by @LeSuisse Activity log
  • Created automatic suggestion
  • @LeSuisse removed
    5 packages
    • asterisk-ldap
    • asterisk-module-sccp
    • python312Packages.asterisk-mbox
    • python313Packages.asterisk-mbox
    • python314Packages.asterisk-mbox
  • @LeSuisse accepted
  • @LeSuisse published on GitHub
Asterisk xml.c uses unsafe XML_PARSE_NOENT leading to potential XXE Injection

Asterisk is an open source private branch exchange and telephony toolkit. Prior to versions 20.7-cert9, 20.18.2, 21.12.1, 22.8.2, and 23.2.2, the ast_xml_open() function in xml.c parses XML documents using libxml with unsafe parsing options that enable entity expansion and XInclude processing. Specifically, it invokes xmlReadFile() with the XML_PARSE_NOENT flag and later processes XIncludes via xmlXIncludeProcess().If any untrusted or user-supplied XML file is passed to this function, it can allow an attacker to trigger XML External Entity (XXE) or XInclude-based local file disclosure, potentially exposing sensitive files from the host system. This can also be triggered in other cases in which the user is able to supply input in xml format that triggers the asterisk process to parse it. This issue has been patched in versions 20.7-cert9, 20.18.2, 21.12.1, 22.8.2, and 23.2.2.

Affected products

asterisk
  • ==< 23.2.2
  • ==< 21.12.1
  • ==< 20.7-cert9
  • ==< 20.18.2
  • ==< 22.8.2

Matching in nixpkgs

pkgs.asterisk_18

Software implementation of a telephone private branch exchange (PBX)

Package maintainers

Upstream advisory: https://github.com/asterisk/asterisk/security/advisories/GHSA-85x7-54wr-vh42
Published
updated 2 weeks ago by @LeSuisse Activity log
  • Created automatic suggestion
  • @LeSuisse removed
    5 packages
    • asterisk-ldap
    • asterisk-module-sccp
    • python312Packages.asterisk-mbox
    • python313Packages.asterisk-mbox
    • python314Packages.asterisk-mbox
  • @LeSuisse accepted
  • @LeSuisse published on GitHub
Asterisk vulnerable to potential privilege escalation

Asterisk is an open source private branch exchange and telephony toolkit. Prior to versions 20.7-cert9, 20.18.2, 21.12.1, 22.8.2, and 23.2.2, when ast_coredumper writes its gdb init and output files to a directory that is world-writable (for example /tmp), an attacker with write permission(which is all users on a linux system) to that directory can cause root to execute arbitrary commands or overwrite arbitrary files by controlling the gdb init file and output paths. This issue has been patched in versions 20.7-cert9, 20.18.2, 21.12.1, 22.8.2, and 23.2.2.

Affected products

asterisk
  • ==< 23.2.2
  • ==< 21.12.1
  • ==< 20.7-cert9
  • ==< 20.18.2
  • ==< 22.8.2

Matching in nixpkgs

pkgs.asterisk_18

Software implementation of a telephone private branch exchange (PBX)

Package maintainers

Upstream advisory: https://github.com/asterisk/asterisk/security/advisories/GHSA-xpc6-x892-v83c
Published
updated 2 weeks ago by @LeSuisse Activity log
  • Created automatic suggestion
  • @LeSuisse removed
    5 packages
    • asterisk-ldap
    • asterisk-module-sccp
    • python312Packages.asterisk-mbox
    • python313Packages.asterisk-mbox
    • python314Packages.asterisk-mbox
  • @LeSuisse accepted
  • @LeSuisse published on GitHub
The Asterisk embedded web server 's /httpstatus page echos user supplied values(cookie and query string) without sanitization

Asterisk is an open source private branch exchange and telephony toolkit. Prior to versions 20.7-cert9, 20.18.2, 21.12.1, 22.8.2, and 23.2.2, user supplied/control values for Cookies and any GET variable query Parameter are directly interpolated into the HTML of the page using ast_str_append. The endpoint at GET /httpstatus is the potential vulnerable endpoint relating to asterisk/main /http.c. This issue has been patched in versions 20.7-cert9, 20.18.2, 21.12.1, 22.8.2, and 23.2.2.

Affected products

asterisk
  • ==< 23.2.2
  • ==< 21.12.1
  • ==< 20.7-cert9
  • ==< 20.18.2
  • ==< 22.8.2

Matching in nixpkgs

pkgs.asterisk_18

Software implementation of a telephone private branch exchange (PBX)

Package maintainers

Upstream advisory: https://github.com/asterisk/asterisk/security/advisories/GHSA-v6hp-wh3r-cwxh