First published: Tue Apr 25 2006(Updated: )
Absolute path traversal vulnerability in recordings/misc/audio.php in the Asterisk Recording Interface (ARI) web interface in Asterisk@Home before 2.8 allows remote attackers to read arbitrary MP3, WAV, and GSM files via a full pathname in the recording parameter. NOTE: this issue can also be used to determine existence of files.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Asterisk | <=2.6 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2006-2021 is classified as a medium severity vulnerability due to its ability to allow unauthorized access to sensitive file contents.
To fix CVE-2006-2021, users should upgrade to Asterisk@Home version 2.8 or later, which resolves the absolute path traversal vulnerability.
CVE-2006-2021 affects all users of Asterisk@Home versions prior to 2.8 using the Asterisk Recording Interface web interface.
CVE-2006-2021 allows remote attackers to read arbitrary MP3, WAV, and GSM files through a crafted request.
The vulnerability in CVE-2006-2021 resides in the recordings/misc/audio.php component of the Asterisk Recording Interface.