Skip to content

Instantly share code, notes, and snippets.

@hyp164D1
Created November 30, 2024 02:58
Show Gist options
  • Save hyp164D1/e7c0f44ffb38c00320aa1a6d98bee616 to your computer and use it in GitHub Desktop.
Save hyp164D1/e7c0f44ffb38c00320aa1a6d98bee616 to your computer and use it in GitHub Desktop.
CVE-2024-53566
[CVE ID]
CVE-2024-53566
[Description]
An issue in the action_listcategories() function of Sangoma Asterisk
v22/22.0.0/22.0.0-rc1/22.0.0-rc2/22.0.0-pre1 allows attackers to
execute a path traversal.
------------------------------------------
[Additional Information]
This may lead to serious configuration information leakage
Python:
# Request file data
cfg = ami_msg('ListCategories', {'Filename': '../../../../../../../../' + args.file})
resp = tcp_send_rcv(sock, cfg)
------------------------------------------
[Vulnerability Type]
Directory Traversal
------------------------------------------
[Vendor of Product]
Sangoma Asterisk
------------------------------------------
[Affected Product Code Base]
Sangoma Asterisk - asterisk 22/22.0.0/22.0.0-rc1/22.0.0-rc2/22.0.0-pre1
------------------------------------------
[Affected Component]
https://github.com/asterisk/asterisk/blob/22/main/manager.c#L2556
manager.conf,action_listcategories()
------------------------------------------
[Attack Type]
Remote
------------------------------------------
[Impact Information Disclosure]
true
------------------------------------------
[Attack Vectors]
Write an attack script and then exploit a path traversal vulnerability to obtain configuration file related information while logging into AMI.
------------------------------------------
[Reference]
https://github.com/asterisk/asterisk/blob/22/main/manager.c#L2556
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment