An Improper Neutralization of Special Elements used in an OS Command issue was discovered in Digium Asterisk GUI 2.1.0 and prior. An OS command injection vulnerability has been identified that may allow the execution of arbitrary code on the system through the inclusion of OS commands in the URL request of the program.
References
Link | Resource |
---|---|
http://www.securityfocus.com/bid/100950 | Third Party Advisory VDB Entry |
https://ics-cert.us-cert.gov/advisories/ICSA-17-264-03 | Third Party Advisory US Government Resource |
http://www.securityfocus.com/bid/100950 | Third Party Advisory VDB Entry |
https://ics-cert.us-cert.gov/advisories/ICSA-17-264-03 | Third Party Advisory US Government Resource |
Configurations
History
21 Nov 2024, 03:11
Type | Values Removed | Values Added |
---|---|---|
References | () http://www.securityfocus.com/bid/100950 - Third Party Advisory, VDB Entry | |
References | () https://ics-cert.us-cert.gov/advisories/ICSA-17-264-03 - Third Party Advisory, US Government Resource |
Information
Published : 2017-09-26 02:29
Updated : 2024-11-21 03:11
NVD link : CVE-2017-14001
Mitre link : CVE-2017-14001
CVE.ORG link : CVE-2017-14001
JSON object : View
Products Affected
digium
- asterisk_gui
CWE
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')