On Thu, Apr 21, 2011 at 04:40:39PM -0500, Asterisk Security Team wrote:
> Asterisk Project Security Advisory - AST-2011-006
>
> Product Asterisk
> Summary Asterisk Manager User Shell Access
> Nature of Advisory Permission Escalation
> Susceptibility Remote Authenticated Sessions
> Severity Minor
> Exploits Known Yes
> Reported On February 10, 2011
> Reported By Mark Murawski <markm AT intellasoft DOT net>
> Posted On April 21, 2011
> Last Updated On April 21, 2011
> Advisory Contact Matthew Nicholson <[email protected]>
> CVE Name
>
> Description It is possible for a user of the Asterisk Manager Interface to
> bypass a security check and execute shell commands when they
> should not have that ability. Sending the "Async" header with
> the "Application" header during an Originate action, allows
> authenticated manager users to execute shell commands. Only
> users with the "system" privilege should be able to do this.
>
> Resolution Asterisk now performs the proper access check where appropriate
> during the originate manager action.
So basically doing some dangerous stuff is only allowed for users with
the 'system' write permissions. Which brings up the interesting
question: are there any such users without such write permission?
IIRC most of the sample I saw included it even before it was actually
meaningful. In fact they all had something of the likes of:
read = system,call,log,verbose,agent,user,config,dtmf,reporting,cdr,dialplan
write = system,call,agent,user,config,command,reporting,originate
So here's a mini poll:
Do you have a manager interface user that does not have all the read and
write permissions? If so: how have you managed to do so?
* Reading documentation / source
* An existing sample
* Trial and Error
--
Tzafrir Cohen
icq#16849755 jabber:[email protected]
+972-50-7952406 mailto:[email protected]
http://www.xorcom.com iax:[email protected]/tzafrir
--
_____________________________________________________________________
-- Bandwidth and Colocation Provided by http://www.api-digital.com --
New to Asterisk? Join us for a live introductory webinar every Thurs:
http://www.asterisk.org/hello
asterisk-users mailing list
To UNSUBSCRIBE or update options visit:
http://lists.digium.com/mailman/listinfo/asterisk-users