CVE-2020-28361

Kamailio before 5.4.0, as used in Sip Express Router (SER) in Sippy Softswitch 4.5 through 5.2 and other products, allows a bypass of a header-removal protection mechanism via whitespace characters. This occurs in the remove_hf function in the Kamailio textops module. Particular use of remove_hf in Sippy Softswitch may allow skilled attacker having a valid credential in the system to disrupt internal call start/duration accounting mechanisms leading potentially to a loss of revenue.
Configurations

Configuration 1 (hide)

cpe:2.3:a:kamailio:kamailio:*:*:*:*:*:*:*:*

History

21 Nov 2024, 05:22

Type Values Removed Values Added
References () https://packetstormsecurity.com/files/159030/Kamailio-5.4.0-Header-Smuggling.html - Exploit, Third Party Advisory, VDB Entry () https://packetstormsecurity.com/files/159030/Kamailio-5.4.0-Header-Smuggling.html - Exploit, Third Party Advisory, VDB Entry
References () https://support.sippysoft.com/support/discussions/topics/3000179616 - Permissions Required () https://support.sippysoft.com/support/discussions/topics/3000179616 - Permissions Required

Information

Published : 2020-11-18 14:15

Updated : 2024-11-21 05:22


NVD link : CVE-2020-28361

Mitre link : CVE-2020-28361

CVE.ORG link : CVE-2020-28361


JSON object : View

Products Affected

kamailio

  • kamailio
CWE
CWE-444

Inconsistent Interpretation of HTTP Requests ('HTTP Request/Response Smuggling')