exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

Asterisk Project Security Advisory - AST-2022-003

Asterisk Project Security Advisory - AST-2022-003
Posted Apr 15, 2022
Authored by Joshua Colp, Leandro Dardini | Site asterisk.org

Asterisk suffers from a possible remote SQL injection vulnerability. Some databases can use backslashes to escape certain characters, such as backticks. If input is provided to func_odbc which includes backslashes it is possible for func_odbc to construct a broken SQL query and the SQL query to fail. Asterisk Open Source versions 16.x up to but not including 16.25.2, 18.x up to but not including 18.11.2, and 19.x up to but not including 19.3.2 are affected. Certified Asterisk versions 16.x up to but not including 16.8-cert14 are affected.

tags | advisory, remote, sql injection
advisories | CVE-2022-26651
SHA-256 | edf4f6fe7b4776e5bf9d41e581c5c4269feb931cb02ec2fa3c1c40c0cbad95e5

Asterisk Project Security Advisory - AST-2022-003

Change Mirror Download
               Asterisk Project Security Advisory - AST-2022-003

Product Asterisk
Summary func_odbc: Possible SQL Injection
Nature of Advisory SQL injection
Susceptibility Remote unauthenticated sessions
Severity Low
Exploits Known No
Reported On January 5, 2022
Reported By Leandro Dardini
Posted On April 14, 2022
Last Updated On April 12, 2022
Advisory Contact Jcolp AT sangoma DOT com
CVE Name CVE-2022-26651

Description Some databases can use backslashes to escape certain
characters, such as backticks. If input is provided to
func_odbc which includes backslashes it is possible
for func_odbc to construct a broken SQL query and the
SQL query to fail.

Additionally while it has not yet been reproduced this
security advisory is also being published to cover the
case of SQL injection with the aim of database
manipulation by an outside party.
Modules Affected func_odbc

Resolution A new dialplan function, SQL_ESC_BACKSLASHES, has been added
to the func_odbc module which will escape backslashes. If
your usage of func_odbc may have input which includes
backslashes and your database uses backslashes to escape
backticks then use the dialplan function to escape the
backslashes.

A second option is to disable support for backslashes for
escaping in your database if the underlying database
supports it.

Affected Versions
Product Release Series
Asterisk Open Source 16.x All versions
Asterisk Open Source 18.x All versions
Asterisk Open Source 19.x All versions
Certified Asterisk 16.x All versions

Corrected In
Product Release
Asterisk Open Source 16.25.2, 18.11.2, 19.3.2
Certified Asterisk 16.8-cert14

Patches
Patch URL Revision
https://downloads.digium.com/pub/security/AST-2022-003-16.diff Asterisk
16
https://downloads.digium.com/pub/security/AST-2022-003-18.diff Asterisk
18
https://downloads.digium.com/pub/security/AST-2022-003-19.diff Asterisk
19
https://downloads.digium.com/pub/security/AST-2022-003-16.8.diff Certified
Asterisk
16.8

Links https://issues.asterisk.org/jira/browse/ASTERISK-29838

https://downloads.asterisk.org/pub/security/AST-2022-003.html

Asterisk Project Security Advisories are posted at
http://www.asterisk.org/security

This document may be superseded by later versions; if so, the latest
version will be posted at
https://downloads.digium.com/pub/security/AST-2022-003.pdf and
https://downloads.digium.com/pub/security/AST-2022-003.html

Revision History
Date Editor Revisions Made
February 15, 2022 Joshua Colp Initial revision

Asterisk Project Security Advisory - AST-2022-003
Copyright © 2022 Digium, Inc. All Rights Reserved.
Permission is hereby granted to distribute and publish this advisory in its
original, unaltered form.
Login or Register to add favorites

File Archive:

September 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Sep 1st
    261 Files
  • 2
    Sep 2nd
    17 Files
  • 3
    Sep 3rd
    38 Files
  • 4
    Sep 4th
    52 Files
  • 5
    Sep 5th
    23 Files
  • 6
    Sep 6th
    27 Files
  • 7
    Sep 7th
    0 Files
  • 8
    Sep 8th
    1 Files
  • 9
    Sep 9th
    16 Files
  • 10
    Sep 10th
    38 Files
  • 11
    Sep 11th
    21 Files
  • 12
    Sep 12th
    40 Files
  • 13
    Sep 13th
    18 Files
  • 14
    Sep 14th
    0 Files
  • 15
    Sep 15th
    0 Files
  • 16
    Sep 16th
    21 Files
  • 17
    Sep 17th
    51 Files
  • 18
    Sep 18th
    23 Files
  • 19
    Sep 19th
    48 Files
  • 20
    Sep 20th
    36 Files
  • 21
    Sep 21st
    0 Files
  • 22
    Sep 22nd
    0 Files
  • 23
    Sep 23rd
    0 Files
  • 24
    Sep 24th
    0 Files
  • 25
    Sep 25th
    0 Files
  • 26
    Sep 26th
    0 Files
  • 27
    Sep 27th
    0 Files
  • 28
    Sep 28th
    0 Files
  • 29
    Sep 29th
    0 Files
  • 30
    Sep 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close