CVE-2024-42365

Asterisk is an open source private branch exchange (PBX) and telephony toolkit. Prior to asterisk versions 18.24.2, 20.9.2, and 21.4.2 and certified-asterisk versions 18.9-cert11 and 20.7-cert2, an AMI user with `write=originate` may change all configuration files in the `/etc/asterisk/` directory. This occurs because they are able to curl remote files and write them to disk, but are also able to append to existing files using the `FILE` function inside the `SET` application. This issue may result in privilege escalation, remote code execution and/or blind server-side request forgery with arbitrary protocol. Asterisk versions 18.24.2, 20.9.2, and 21.4.2 and certified-asterisk versions 18.9-cert11 and 20.7-cert2 contain a fix for this issue.
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTNIST
7.4 HIGH
NETWORK
LOW
LOW
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:L
GitHub_MCNA
7.4 HIGH
NETWORK
LOW
LOW
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:L
CISA-ADPADP
---
---
Base Score
CVSS 3.x
EPSS Score
Percentile: 96%
VendorProductVersion
asteriskasterisk
𝑥
< 18.24.2
asteriskasterisk
19.0.0 ≤
𝑥
< 20.9.1
asteriskasterisk
21.4.0
asteriskcertified_asterisk
13.13.0
asteriskcertified_asterisk
13.13.0:cert1
asteriskcertified_asterisk
13.13.0:cert1-rc1
asteriskcertified_asterisk
13.13.0:cert1-rc2
asteriskcertified_asterisk
13.13.0:cert1-rc3
asteriskcertified_asterisk
13.13.0:cert1-rc4
asteriskcertified_asterisk
13.13.0:cert2
asteriskcertified_asterisk
13.13.0:cert3
asteriskcertified_asterisk
13.13.0:rc1
asteriskcertified_asterisk
13.13.0:rc2
asteriskcertified_asterisk
16.8:cert1-rc1
asteriskcertified_asterisk
16.8:cert1-rc2
asteriskcertified_asterisk
16.8:cert1-rc3
asteriskcertified_asterisk
16.8:cert1-rc4
asteriskcertified_asterisk
16.8:cert1-rc5
asteriskcertified_asterisk
16.8:cert10
asteriskcertified_asterisk
16.8:cert11
asteriskcertified_asterisk
16.8:cert12
asteriskcertified_asterisk
16.8:cert13
asteriskcertified_asterisk
16.8:cert14
asteriskcertified_asterisk
16.8:cert4-rc1
asteriskcertified_asterisk
16.8:cert4-rc2
asteriskcertified_asterisk
16.8:cert4-rc3
asteriskcertified_asterisk
16.8:cert4-rc4
asteriskcertified_asterisk
16.8.0
asteriskcertified_asterisk
16.8.0:cert1
asteriskcertified_asterisk
16.8.0:cert10
asteriskcertified_asterisk
16.8.0:cert11
asteriskcertified_asterisk
16.8.0:cert12
asteriskcertified_asterisk
16.8.0:cert2
asteriskcertified_asterisk
16.8.0:cert3
asteriskcertified_asterisk
16.8.0:cert4
asteriskcertified_asterisk
16.8.0:cert5
asteriskcertified_asterisk
16.8.0:cert6
asteriskcertified_asterisk
16.8.0:cert7
asteriskcertified_asterisk
16.8.0:cert8
asteriskcertified_asterisk
16.8.0:cert9
asteriskcertified_asterisk
18.9:cert1
asteriskcertified_asterisk
18.9:cert1-rc1
asteriskcertified_asterisk
18.9:cert10
asteriskcertified_asterisk
18.9:cert2
asteriskcertified_asterisk
18.9:cert3
asteriskcertified_asterisk
18.9:cert4
asteriskcertified_asterisk
18.9:cert5
asteriskcertified_asterisk
18.9:cert6
asteriskcertified_asterisk
18.9:cert7
asteriskcertified_asterisk
18.9:cert8
asteriskcertified_asterisk
18.9:cert8-rc1
asteriskcertified_asterisk
18.9:cert8-rc2
asteriskcertified_asterisk
18.9:cert9
asteriskcertified_asterisk
20.7:cert1
asteriskcertified_asterisk
20.7:cert1-rc1
asteriskcertified_asterisk
20.7:cert1-rc2
𝑥
= Vulnerable software versions
Debian logo
Debian Releases
Debian Product
Codename
asterisk
bullseye
vulnerable
bullseye (security)
1:16.28.0~dfsg-0+deb11u6
fixed
sid
1:22.4.1~dfsg+~cs6.15.60671435-1
fixed
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
asterisk
plucky
needs-triage
oracular
needs-triage
noble
needs-triage
jammy
needs-triage
focal
needs-triage
bionic
needs-triage
xenial
needs-triage