First published: Tue Apr 25 2006(Updated: )
Asterisk Recording Interface (ARI) in Asterisk@Home before 2.8 stores recordings/includes/main.conf under the web document root with insufficient access control, which allows remote attackers to obtain password information.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Asterisk | <=2.6 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2006-2020 is classified as a high-severity vulnerability due to its ability to expose sensitive password information.
To fix CVE-2006-2020, upgrade to Asterisk@Home version 2.8 or later and ensure proper access controls for configuration files.
CVE-2006-2020 describes an issue where the Asterisk Recording Interface improperly exposes configuration files under the web document root.
Users of Asterisk@Home versions prior to 2.8 are affected by CVE-2006-2020 due to insufficient access controls.
CVE-2006-2020 can allow remote attackers to obtain sensitive password information, potentially compromising system security.