]> git.ipfire.org Git - thirdparty/asterisk.git/commit
AST-2012-004: Fix an error that allows AMI users to run shell commands sans authoriza...
authorJonathan Rose <jrose@digium.com>
Mon, 23 Apr 2012 14:39:48 +0000 (14:39 +0000)
committerJonathan Rose <jrose@digium.com>
Mon, 23 Apr 2012 14:39:48 +0000 (14:39 +0000)
commit6238c81197badb77c1a906bcc6be3bcf32e4391b
tree9ab7fe7c5a8608223b460d491dfafdec365902f8
parent75cbeb35c34b04122b65b73e8242ef3cc31d2d00
AST-2012-004: Fix an error that allows AMI users to run shell commands sans authorization.

As detailed in the advisory, AMI users without write authorization for SYSTEM class AMI
actions were able to run system commands by going through other AMI commands which did
not require that authorization. Specifically, GetVar and Status allowed users to do this
by setting their variable/s options to the SHELL or EVAL functions.
Also, within 1.8, 10, and trunk there was a similar flaw with the Originate action that
allowed users with originate permission to run MixMonitor and supply a shell command
in the Data argument. That flaw is fixed in those versions of this patch.

(closes issue ASTERISK-17465)
Reported By: David Woolley
Patches:
162_ami_readfunc_security_r2.diff uploaded by jrose (license 6182)
18_ami_readfunc_security_r2.diff uploaded by jrose (license 6182)
10_ami_readfunc_security_r2.diff uploaded by jrose (license 6182)
........

Merged revisions 363117 from http://svn.asterisk.org/svn/asterisk/branches/1.6.2
........

Merged revisions 363141 from http://svn.asterisk.org/svn/asterisk/branches/1.8

git-svn-id: https://origsvn.digium.com/svn/asterisk/branches/10@363156 65c4cc65-6c06-0410-ace0-fbb531ad65f3
main/manager.c