An issue was discovered in Asterisk through 19.x and Certified Asterisk through 16.8-cert13. The func_odbc module provides possibly inadequate escaping functionality for backslash characters in SQL queries, resulting in user-provided data creating a broken SQL query or possibly a SQL injection. This is fixed in 16.25.2, 18.11.2, and 19.3.2, and 16.8-cert14.
References
| Link | Resource |
|---|---|
| http://packetstormsecurity.com/files/166746/Asterisk-Project-Security-Advisory-AST-2022-003.html | Third Party Advisory VDB Entry |
| https://downloads.asterisk.org/pub/security/ | Vendor Advisory |
| https://downloads.asterisk.org/pub/security/AST-2022-003.html | Vendor Advisory |
| https://lists.debian.org/debian-lts-announce/2022/11/msg00021.html | Mailing List Third Party Advisory |
| https://www.debian.org/security/2022/dsa-5285 | Third Party Advisory |
| http://packetstormsecurity.com/files/166746/Asterisk-Project-Security-Advisory-AST-2022-003.html | Third Party Advisory VDB Entry |
| https://downloads.asterisk.org/pub/security/ | Vendor Advisory |
| https://downloads.asterisk.org/pub/security/AST-2022-003.html | Vendor Advisory |
| https://lists.debian.org/debian-lts-announce/2022/11/msg00021.html | Mailing List Third Party Advisory |
| https://www.debian.org/security/2022/dsa-5285 | Third Party Advisory |
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
History
21 Nov 2024, 06:54
| Type | Values Removed | Values Added |
|---|---|---|
| References | () http://packetstormsecurity.com/files/166746/Asterisk-Project-Security-Advisory-AST-2022-003.html - Third Party Advisory, VDB Entry | |
| References | () https://downloads.asterisk.org/pub/security/ - Vendor Advisory | |
| References | () https://downloads.asterisk.org/pub/security/AST-2022-003.html - Vendor Advisory | |
| References | () https://lists.debian.org/debian-lts-announce/2022/11/msg00021.html - Mailing List, Third Party Advisory | |
| References | () https://www.debian.org/security/2022/dsa-5285 - Third Party Advisory |
18 Nov 2022, 16:15
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
27 Apr 2022, 14:45
| Type | Values Removed | Values Added |
|---|---|---|
| References | (MISC) http://packetstormsecurity.com/files/166746/Asterisk-Project-Security-Advisory-AST-2022-003.html - Third Party Advisory, VDB Entry | |
| References | (MISC) https://downloads.asterisk.org/pub/security/ - Vendor Advisory | |
| References | (MISC) https://downloads.asterisk.org/pub/security/AST-2022-003.html - Vendor Advisory | |
| CPE | cpe:2.3:a:digium:certified_asterisk:16.8:cert4-rc4:*:*:*:*:*:* cpe:2.3:a:digium:certified_asterisk:16.8:cert11:*:*:*:*:*:* cpe:2.3:a:digium:certified_asterisk:16.8:cert7:*:*:*:*:*:* cpe:2.3:a:digium:certified_asterisk:16.8:cert9:*:*:*:*:*:* cpe:2.3:a:digium:certified_asterisk:16.8:cert1-rc4:*:*:*:*:*:* cpe:2.3:a:digium:certified_asterisk:16.8:cert1-rc2:*:*:*:*:*:* cpe:2.3:a:digium:certified_asterisk:16.8:cert1-rc1:*:*:*:*:*:* cpe:2.3:a:digium:certified_asterisk:16.8:cert12:*:*:*:*:*:* cpe:2.3:a:digium:certified_asterisk:16.8:cert10:*:*:*:*:*:* cpe:2.3:a:digium:certified_asterisk:16.8:cert8:*:*:*:*:*:* cpe:2.3:a:digium:certified_asterisk:16.8:cert4-rc1:*:*:*:*:*:* cpe:2.3:a:digium:certified_asterisk:16.8:cert4:*:*:*:*:*:* cpe:2.3:a:digium:certified_asterisk:16.8:cert13:*:*:*:*:*:* cpe:2.3:a:digium:certified_asterisk:16.8:-:*:*:*:*:*:* cpe:2.3:a:digium:asterisk:*:*:*:*:*:*:*:* cpe:2.3:a:digium:certified_asterisk:16.8:cert4-rc3:*:*:*:*:*:* cpe:2.3:a:digium:certified_asterisk:16.8:cert3:*:*:*:*:*:* cpe:2.3:a:digium:certified_asterisk:16.8:cert6:*:*:*:*:*:* cpe:2.3:a:digium:certified_asterisk:16.8:cert1-rc3:*:*:*:*:*:* cpe:2.3:a:digium:certified_asterisk:16.8:cert5:*:*:*:*:*:* cpe:2.3:a:digium:certified_asterisk:16.8:cert4-rc2:*:*:*:*:*:* cpe:2.3:a:digium:certified_asterisk:16.8:cert2:*:*:*:*:*:* |
|
| CVSS |
v2 : v3 : |
v2 : 7.5
v3 : 9.8 |
| CWE | CWE-89 |
15 Apr 2022, 18:15
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
15 Apr 2022, 05:15
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2022-04-15 05:15
Updated : 2024-11-21 06:54
NVD link : CVE-2022-26651
Mitre link : CVE-2022-26651
CVE.ORG link : CVE-2022-26651
JSON object : View
Products Affected
digium
- asterisk
- certified_asterisk
debian
- debian_linux
CWE
CWE-89
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
