Asterisk Recording Interface (ARI) misc/audio.php recording Parameter Traversal Arbitrary File Access

medium Nessus Plugin ID 21304

Synopsis

The remote web server contains a PHP application that is affected by an information disclosure issue.

Description

The remote host is running Asterisk Recording Interface (ARI), a web-based portal for the Asterisk PBX software.

The version of ARI installed on the remote host reportedly allows an unauthenticated attacker to retrieve arbitrary sound files, such as voicemail messages, and to determine the existence of other files on the remote host by passing a specially crafted path to the 'recording' parameter of the 'misc/audio.php' script.

Solution

Upgrade to ARI 0.10 / Asterisk@Home 2.8 or later.

See Also

https://www.securityfocus.com/archive/1/431655/30/0/threaded

Plugin Details

Severity: Medium

ID: 21304

File Name: asterisk_recording_info_disclosure.nasl

Version: 1.18

Type: remote

Family: CGI abuses

Published: 5/3/2006

Updated: 4/11/2022

Configuration: Enable thorough checks

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Low

Score: 3.3

CVSS v2

Risk Factor: Medium

Base Score: 5

Temporal Score: 4.8

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:N/A:N

Vulnerability Information

CPE: cpe:/a:asteriskathome:asteriskathome

Required KB Items: www/PHP

Excluded KB Items: Settings/disable_cgi_scanning

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 4/20/2006

Vulnerability Publication Date: 4/20/2006

Reference Information

CVE: CVE-2006-2021

BID: 17641