Kamailio before 5.4.0, as used in Sip Express Router (SER) in Sippy Softswitch 4.5 through 5.2 and other products, allows a bypass of a header-removal protection mechanism via whitespace characters. This occurs in the remove_hf function in the Kamailio textops module. Particular use of remove_hf in Sippy Softswitch may allow skilled attacker having a valid credential in the system to disrupt internal call start/duration accounting mechanisms leading potentially to a loss of revenue.
References
Link | Resource |
---|---|
https://packetstormsecurity.com/files/159030/Kamailio-5.4.0-Header-Smuggling.html | Exploit Third Party Advisory VDB Entry |
https://support.sippysoft.com/support/discussions/topics/3000179616 | Permissions Required |
https://packetstormsecurity.com/files/159030/Kamailio-5.4.0-Header-Smuggling.html | Exploit Third Party Advisory VDB Entry |
https://support.sippysoft.com/support/discussions/topics/3000179616 | Permissions Required |
Configurations
History
21 Nov 2024, 05:22
Type | Values Removed | Values Added |
---|---|---|
References | () https://packetstormsecurity.com/files/159030/Kamailio-5.4.0-Header-Smuggling.html - Exploit, Third Party Advisory, VDB Entry | |
References | () https://support.sippysoft.com/support/discussions/topics/3000179616 - Permissions Required |
Information
Published : 2020-11-18 14:15
Updated : 2024-11-21 05:22
NVD link : CVE-2020-28361
Mitre link : CVE-2020-28361
CVE.ORG link : CVE-2020-28361
JSON object : View
Products Affected
kamailio
- kamailio
CWE
CWE-444
Inconsistent Interpretation of HTTP Requests ('HTTP Request/Response Smuggling')