First published: Wed Nov 18 2020(Updated: )
Kamailio before 5.4.0, as used in Sip Express Router (SER) in Sippy Softswitch 4.5 through 5.2 and other products, allows a bypass of a header-removal protection mechanism via whitespace characters. This occurs in the remove_hf function in the Kamailio textops module. Particular use of remove_hf in Sippy Softswitch may allow skilled attacker having a valid credential in the system to disrupt internal call start/duration accounting mechanisms leading potentially to a loss of revenue.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Kamailio | <5.4.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-28361 is classified as a medium severity vulnerability that allows for header-removal protection bypass.
To resolve CVE-2020-28361, upgrade to Kamailio version 5.4.0 or later, which addresses the vulnerability.
CVE-2020-28361 affects Kamailio versions prior to 5.4.0, as well as products using these versions such as Sippy Softswitch 4.5 through 5.2.
The impact of CVE-2020-28361 is that it allows attackers to manipulate HTTP headers, potentially leading to security vulnerabilities like header injection.
The CVE-2020-28361 vulnerability is a result of insufficient header-removal protection in the Kamailio textops module.