Missing Authentication for Critical Function Affecting asterisk package, versions [,1.2.40)


Severity

Recommended
0.0
medium
0
10

CVSS assessment by Snyk's Security Team. Learn more

Threat Intelligence

EPSS
0.09% (28th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications

Snyk Learn

Learn about Missing Authentication for Critical Function vulnerabilities in an interactive lesson.

Start learning
  • Snyk IDSNYK-UNMANAGED-ASTERISK-2371623
  • published26 Jan 2022
  • disclosed23 Feb 2010
  • creditUnknown

Introduced: 23 Feb 2010

CVE-2010-0685  (opens in a new tab)
CWE-306  (opens in a new tab)

How to fix?

Upgrade asterisk to version 1.2.40 or higher.

Overview

Affected versions of this package are vulnerable to Missing Authentication for Critical Function. The design of the dialplan functionality in Asterisk Open Source 1.2.x, 1.4.x, and 1.6.x; and Asterisk Business Edition B.x.x and C.x.x, when using the ${EXTEN} channel variable and wildcard pattern matches, allows context-dependent attackers to inject strings into the dialplan using metacharacters that are injected when the variable is expanded, as demonstrated using the Dial application to process a crafted SIP INVITE message that adds an unintended outgoing channel leg. NOTE: it could be argued that this is not a vulnerability in Asterisk, but a class of vulnerabilities that can occur in any program that uses this feature without the associated filtering functionality that is already available.

CVSS Base Scores

version 3.1