First published: Mon Dec 05 2022(Updated: )
An issue was discovered in Sangoma Asterisk through 16.28, 17 and 18 through 18.14, 19 through 19.6, and certified through 18.9-cert1. GetConfig, via Asterisk Manager Interface, allows a connected application to access files outside of the asterisk configuration directory, aka Directory Traversal.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Sangoma Asterisk | >=16.0.0<16.29.1 | |
Sangoma Asterisk | >=17.0.0<18.15.1 | |
Sangoma Asterisk | >=19.0.0<19.7.1 | |
Sangoma Asterisk | =20.0.0 | |
Sangoma Certified Asterisk | <18.9 | |
Sangoma Certified Asterisk | =18.9-cert1 | |
debian/asterisk | <=1:16.2.1~dfsg-1+deb10u2 | 1:16.28.0~dfsg-0+deb10u4 1:16.28.0~dfsg-0+deb11u3 1:20.5.2~dfsg+~cs6.13.40431414-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-42706 is an issue discovered in Sangoma Asterisk that allows a connected application to access files outside of the asterisk configuration directory, aka Directory Traversal.
CVE-2022-42706 allows an attacker to access files outside of the asterisk configuration directory, potentially leading to unauthorized access or disclosure of sensitive information.
CVE-2022-42706 has a severity rating of 4.9 (medium).
To fix CVE-2022-42706, it is recommended to upgrade Sangoma Asterisk to the latest version available as per the provided references.
You can find more information about CVE-2022-42706 in the references provided: [link1](https://issues.asterisk.org/jira/browse/ASTERISK-30176), [link2](https://downloads.asterisk.org/pub/security/AST-2022-009.html), [link3](https://git.asterisk.org/gitweb/?p=asterisk/asterisk.git;a=commit;h=81f10e847efdbe8ec264062ee234e1098c29b3f6).