CVE-2012-2414

MEDIUM

Description

main/manager.c in the Manager Interface in Asterisk Open Source 1.6.2.x before 1.6.2.24, 1.8.x before 1.8.11.1, and 10.x before 10.3.1 and Asterisk Business Edition C.3.x before C.3.7.4 does not properly enforce System class authorization requirements, which allows remote authenticated users to execute arbitrary commands via (1) the originate action in the MixMonitor application, (2) the SHELL and EVAL functions in the GetVar manager action, or (3) the SHELL and EVAL functions in the Status manager action.

References

http://downloads.asterisk.org/pub/security/AST-2012-004.html

http://lists.fedoraproject.org/pipermail/package-announce/2012-May/079759.html

http://osvdb.org/81454

http://secunia.com/advisories/48891

http://secunia.com/advisories/48941

http://www.debian.org/security/2012/dsa-2460

http://www.securityfocus.com/bid/53206

http://www.securitytracker.com/id?1026961

https://exchange.xforce.ibmcloud.com/vulnerabilities/75100

Details

Source: MITRE

Published: 2012-04-30

Updated: 2017-12-14

Type: CWE-287

Risk Information

CVSS v2.0

Base Score: 6.5

Vector: AV:N/AC:L/Au:S/C:P/I:P/A:P

Impact Score: 6.4

Exploitability Score: 8

Severity: MEDIUM