Asterisk Recording Interface Audio.PHP 信息泄露漏洞

QQ空间 新浪微博 微信 QQ facebook twitter
漏洞ID 1195240 漏洞类型 输入验证
发布时间 2006-04-25 更新时间 2006-04-26
CVE编号 CVE-2006-2021 CNNVD-ID CNNVD-200604-452
漏洞平台 N/A CVSS评分 5.0
|漏洞来源
https://cxsecurity.com/issue/WLB-2006040075
http://www.cnnvd.org.cn/web/xxk/ldxqById.tag?CNNVD=CNNVD-200604-452
|漏洞详情
Asterisk@Home2.8之前的版本中的Asterisk录音接口(ARI)web界面中的recordings/misc/audio.php存在绝对路径遍历漏洞。这使得远程攻击者可以借助于recording参数中的完整路径名读取任意MP3、WAV和GSM文件。
|漏洞EXP
ID     :              2006.1
Product :          ARI (Asterisk Recording Interface)
                        http://www.littlejohnconsulting.com/?q=node/11
                        Asterisk@home Distribution
                        http://asteriskathome.sourceforge.net/
Affected product : <= 0.7.15 (Asterisk@Home 2.6 and lower)
Class :              Access to protected information, directory traversal
Remote :          yes
Author :           Francois Harvey <fharvey at securiweb dot net>
Published date :   2006-04-20 (Initial Vendor contact 2006-03-06)
Reference URL :  
http://www.securiweb.net/wiki/Ressources/AvisDeSecurite/2006.1
Solution :         Use the last ARI version or use asterisk@home 2.8

Two vulnerabilities was found in the ARI package included in the  
asterisk@home Distribution. These vulnerabilities allow a user to listen 
voicemail from any other users and and to disclose configuration password.

Vulnerability 1
---------------

The config file is in a public directory and not protected by default

Exploit : http://<asterisk>/recordings/includes/main.conf

This should list all the configuration of ARI. With asterisk password, 
db password, admin password.

Vulnerability 2
---------------

A directory traversal/file retreival exist in the ARI web interface.
This script allow a user to download any mp3/wav/gsm on the system. No 
authentification is needed, this can be used to listen voicemail from 
another user.

Exploit : 
http://<asterisk>/recordings/misc/audio.php?recording=/var/spool/asteris
k/voicemail/default/<mailbox>/INBOX/msg<messageid>.wav

This flaw can also be used to verify the presence of a file on the server
Cannot use file: xxx <-- file exist bot not the good extension
404 File not found! <--- file doesn't exist

Patch
------
Both asterisk@home and ARI released fixes

Author
-------
Francois Harvey <fharvey at securiweb dot net>
SecuriWeb inc | www.securiweb.net
|参考资料

来源:BID
名称:17641
链接:http://www.securityfocus.com/bid/17641
来源:VUPEN
名称:ADV-2006-1457
链接:http://www.frsirt.com/english/advisories/2006/1457
来源:SECUNIA
名称:19744
链接:http://secunia.com/advisories/19744
来源:MISC
链接:http://www.securiweb.net/wiki/Ressources/AvisDeSecurite/2006.1
来源:BUGTRAQ
名称:20060421[SecuriWeb2006.1]directorytraversalinAsterisk@HomeandARI
链接:http://www.securityfocus.com/archive/1/archive/1/431655/100/0/threaded
来源:XF
名称:asterisk-audio-directory-traversal(25996)
链接:http://xforce.iss.net/xforce/xfdb/25996
来源:OSVDB
名称:24806
链接:http://www.osvdb.org/24806
来源:SREASON
名称:750
链接:http://securityreason.com/securityalert/750