U.S. flag   An official website of the United States government
Dot gov

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Https

Secure .gov websites use HTTPS
A lock (Dot gov) or https:// means you've safely connected to the .gov website. Share sensitive information only on official, secure websites.

Vulnerability Change Records for CVE-2024-49215

Change History

CVE Modified by MITRE 12/09/2024 6:15:08 PM

Action Type Old Value New Value
Changed Description
An issue was discovered in Sangoma Asterisk through 18.20.0, 19.x and 20.x through 20.5.0, and 21.x through 21.0.0, and Certified Asterisk through 18.9-cert5. In manager.c, the functions action_getconfig() and action_getconfigJson() do not process the input file path, resulting in a path traversal vulnerability. In versions without the restrictedFile() function, no processing is done on the input path. In versions with the restrictedFile() function, path traversal is not processed.
Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2023-49294. Reason: This candidate is a reservation duplicate of CVE-2023-49294. Notes: All CVE users should reference CVE-2023-49294 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage.
Removed CVSS V3.1
CISA-ADP: AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

								
						
Removed CVSS V3.1
NIST: AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

								
						
Removed CWE
CISA-ADP: CWE-22

								
						
Removed CWE
NIST: CWE-22

								
						
Removed CPE Configuration
3134751   Config Identifier: 0, OR
     
          *cpe:2.3:a:sangoma:certified_asterisk:18.9:cert2:*:*:*:*:*:*
          *cpe:2.3:a:sangoma:certified_asterisk:18.9:cert1:*:*:*:*:*:*
          *cpe:2.3:a:sangoma:certified_asterisk:*:*:*:*:*:*:*:* versions from (excluding) 18.9
          *cpe:2.3:a:sangoma:certified_asterisk:18.9:cert3:*:*:*:*:*:*
          *cpe:2.3:a:sangoma:certified_asterisk:18.9:cert4:*:*:*:*:*:*
          *cpe:2.3:a:sangoma:certified_asterisk:18.9:cert5:*:*:*:*:*:*
          *cpe:2.3:a:sangoma:asterisk:*:*:*:*:*:*:*:* versions from (including) 18.20.0
          *cpe:2.3:a:sangoma:asterisk:*:*:*:*:*:*:*:* versions from (including) 19.0.0 from (including) 20.5.0
          *cpe:2.3:a:sangoma:asterisk:21.0.0:*:*:*:*:*:*:*
          *cpe:2.3:a:sangoma:certified_asterisk:18.9:cert1-rc1:*:*:*:*:*:*

								
						
Removed Reference
MITRE: https://gist.github.com/hyp164D1/5d68b9b7a504f1416272a825ce65966a

								
						
Removed Reference
MITRE: https://github.com/asterisk/asterisk/blob/20.5.0/main/manager.c#L3755

								
						
Removed Reference Type
MITRE: https://gist.github.com/hyp164D1/5d68b9b7a504f1416272a825ce65966a Types: Third Party Advisory

								
						
Removed Reference Type
MITRE: https://github.com/asterisk/asterisk/blob/20.5.0/main/manager.c#L3755 Types: Product

								
						

CVE Rejected by MITRE 12/09/2024 6:15:08 PM

Action Type Old Value New Value