CVE-2012-2414

high

Description

main/manager.c in the Manager Interface in Asterisk Open Source 1.6.2.x before 1.6.2.24, 1.8.x before 1.8.11.1, and 10.x before 10.3.1 and Asterisk Business Edition C.3.x before C.3.7.4 does not properly enforce System class authorization requirements, which allows remote authenticated users to execute arbitrary commands via (1) the originate action in the MixMonitor application, (2) the SHELL and EVAL functions in the GetVar manager action, or (3) the SHELL and EVAL functions in the Status manager action.

References

https://exchange.xforce.ibmcloud.com/vulnerabilities/75100

http://www.securitytracker.com/id?1026961

http://www.securityfocus.com/bid/53206

http://www.debian.org/security/2012/dsa-2460

http://secunia.com/advisories/48941

http://secunia.com/advisories/48891

http://osvdb.org/81454

http://lists.fedoraproject.org/pipermail/package-announce/2012-May/079759.html

http://downloads.asterisk.org/pub/security/AST-2012-004.html

Details

Source: Mitre, NVD

Published: 2012-04-30

Updated: 2017-12-14

Risk Information

CVSS v2

Base Score: 6.5

Vector: CVSS2#AV:N/AC:L/Au:S/C:P/I:P/A:P

Severity: Medium

CVSS v3

Base Score: 8.8

Vector: CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

Severity: High