An issue was discovered in Asterisk through 19.x and Certified Asterisk through 16.8-cert13. The func_odbc module provides possibly inadequate escaping functionality for backslash characters in SQL queries, resulting in user-provided data creating a broken SQL query or possibly a SQL injection. This is fixed in 16.25.2, 18.11.2, and 19.3.2, and 16.8-cert14.
References
Link | Resource |
---|---|
http://packetstormsecurity.com/files/166746/Asterisk-Project-Security-Advisory-AST-2022-003.html | Third Party Advisory VDB Entry |
https://downloads.asterisk.org/pub/security/ | Vendor Advisory |
https://downloads.asterisk.org/pub/security/AST-2022-003.html | Vendor Advisory |
https://lists.debian.org/debian-lts-announce/2022/11/msg00021.html | Mailing List Third Party Advisory |
https://www.debian.org/security/2022/dsa-5285 | Third Party Advisory |
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
History
02 Feb 2023, 18:47
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:* cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:* |
|
References | (MLIST) https://lists.debian.org/debian-lts-announce/2022/11/msg00021.html - Mailing List, Third Party Advisory | |
References | (DEBIAN) https://www.debian.org/security/2022/dsa-5285 - Third Party Advisory | |
First Time |
Debian
Debian debian Linux |
18 Nov 2022, 16:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
17 Nov 2022, 14:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
27 Apr 2022, 14:45
Type | Values Removed | Values Added |
---|---|---|
CWE | CWE-89 | |
CVSS |
v2 : v3 : |
v2 : 7.5
v3 : 9.8 |
First Time |
Digium
Digium asterisk Digium certified Asterisk |
|
CPE | cpe:2.3:a:digium:certified_asterisk:16.8:cert10:*:*:*:*:*:* cpe:2.3:a:digium:certified_asterisk:16.8:cert3:*:*:*:*:*:* cpe:2.3:a:digium:certified_asterisk:16.8:cert7:*:*:*:*:*:* cpe:2.3:a:digium:certified_asterisk:16.8:cert4-rc3:*:*:*:*:*:* cpe:2.3:a:digium:certified_asterisk:16.8:cert2:*:*:*:*:*:* cpe:2.3:a:digium:certified_asterisk:16.8:cert1-rc1:*:*:*:*:*:* cpe:2.3:a:digium:asterisk:*:*:*:*:*:*:*:* cpe:2.3:a:digium:certified_asterisk:16.8:cert1-rc2:*:*:*:*:*:* cpe:2.3:a:digium:certified_asterisk:16.8:cert4:*:*:*:*:*:* cpe:2.3:a:digium:certified_asterisk:16.8:cert4-rc4:*:*:*:*:*:* cpe:2.3:a:digium:certified_asterisk:16.8:cert8:*:*:*:*:*:* cpe:2.3:a:digium:certified_asterisk:16.8:cert4-rc2:*:*:*:*:*:* cpe:2.3:a:digium:certified_asterisk:16.8:cert12:*:*:*:*:*:* cpe:2.3:a:digium:certified_asterisk:16.8:cert1-rc4:*:*:*:*:*:* cpe:2.3:a:digium:certified_asterisk:16.8:cert9:*:*:*:*:*:* cpe:2.3:a:digium:certified_asterisk:16.8:cert4-rc1:*:*:*:*:*:* cpe:2.3:a:digium:certified_asterisk:16.8:cert1-rc3:*:*:*:*:*:* cpe:2.3:a:digium:certified_asterisk:16.8:cert5:*:*:*:*:*:* cpe:2.3:a:digium:certified_asterisk:16.8:cert13:*:*:*:*:*:* cpe:2.3:a:digium:certified_asterisk:16.8:-:*:*:*:*:*:* cpe:2.3:a:digium:certified_asterisk:16.8:cert6:*:*:*:*:*:* cpe:2.3:a:digium:certified_asterisk:16.8:cert11:*:*:*:*:*:* |
|
References | (MISC) http://packetstormsecurity.com/files/166746/Asterisk-Project-Security-Advisory-AST-2022-003.html - Third Party Advisory, VDB Entry | |
References | (MISC) https://downloads.asterisk.org/pub/security/AST-2022-003.html - Vendor Advisory | |
References | (MISC) https://downloads.asterisk.org/pub/security/ - Vendor Advisory |
15 Apr 2022, 18:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
15 Apr 2022, 05:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2022-04-15 05:15
Updated : 2023-12-10 14:22
NVD link : CVE-2022-26651
Mitre link : CVE-2022-26651
CVE.ORG link : CVE-2022-26651
JSON object : View
Products Affected
digium
- certified_asterisk
- asterisk
debian
- debian_linux
CWE
CWE-89
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')