First published: Tue Sep 26 2017(Updated: )
An Improper Neutralization of Special Elements used in an OS Command issue was discovered in Digium Asterisk GUI 2.1.0 and prior. An OS command injection vulnerability has been identified that may allow the execution of arbitrary code on the system through the inclusion of OS commands in the URL request of the program.
Credit: ics-cert@hq.dhs.gov
Affected Software | Affected Version | How to fix |
---|---|---|
Asterisk | <=2.1.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2017-14001 is classified as a high severity vulnerability due to the potential for arbitrary code execution.
To fix CVE-2017-14001, upgrade to a version of Digium Asterisk GUI that is newer than 2.1.0.
CVE-2017-14001 affects systems running Digium Asterisk GUI version 2.1.0 and earlier.
OS command injection in CVE-2017-14001 allows attackers to execute arbitrary commands on the system through manipulated URLs.
The impact of CVE-2017-14001 could include unauthorized access, data breaches, and full system compromise due to arbitrary code execution.