CVE-2022-26499

critical

Description

An SSRF issue was discovered in Asterisk through 19.x. When using STIR/SHAKEN, it's possible to send arbitrary requests (such as GET) to interfaces such as localhost by using the Identity header. This is fixed in 16.25.2, 18.11.2, and 19.3.2.

References

https://www.debian.org/security/2022/dsa-5285

https://lists.debian.org/debian-lts-announce/2022/11/msg00021.html

https://downloads.asterisk.org/pub/security/AST-2022-002.html

https://downloads.asterisk.org/pub/security/

http://packetstormsecurity.com/files/166745/Asterisk-Project-Security-Advisory-AST-2022-002.html

Details

Source: Mitre, NVD

Published: 2022-04-15

Updated: 2024-11-21

Risk Information

CVSS v2

Base Score: 6.4

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:N

Severity: Medium

CVSS v3

Base Score: 9.1

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N

Severity: Critical