Absolute path traversal vulnerability in recordings/misc/audio.php in the Asterisk Recording Interface (ARI) web interface in Asterisk@Home before 2.8 allows remote attackers to read arbitrary MP3, WAV, and GSM files via a full pathname in the recording parameter. NOTE: this issue can also be used to determine existence of files.
Link | Tags |
---|---|
http://www.securityfocus.com/archive/1/431655/100/0/threaded | mailing list |
http://www.vupen.com/english/advisories/2006/1457 | vdb entry |
http://secunia.com/advisories/19744 | exploit third party advisory patch vendor advisory |
https://exchange.xforce.ibmcloud.com/vulnerabilities/25996 | vdb entry |
http://securityreason.com/securityalert/750 | third party advisory |
http://www.securityfocus.com/bid/17641 | exploit vdb entry patch |
http://www.securiweb.net/wiki/Ressources/AvisDeSecurite/2006.1 | exploit |
http://www.osvdb.org/24806 | vdb entry |