[asterisk-bugs] [Asterisk 0010365]: [patch] Add manager command shell for accessing the system shell

noreply at bugs.digium.com noreply at bugs.digium.com
Thu Aug 2 06:58:43 CDT 2007


A NOTE has been added to this issue. 
====================================================================== 
http://bugs.digium.com/view.php?id=10365 
====================================================================== 
Reported By:                bkruse
Assigned To:                
====================================================================== 
Project:                    Asterisk
Issue ID:                   10365
Category:                   Core/ManagerInterface
Reproducibility:            N/A
Severity:                   feature
Priority:                   normal
Status:                     new
Asterisk Version:            SVN 
SVN Branch (only for SVN checkouts, not tarball releases):  trunk 
SVN Revision (number only!): 77884 
Disclaimer on File?:        N/A 
Request Review:              
====================================================================== 
Date Submitted:             08-01-2007 16:24 CDT
Last Modified:              08-02-2007 06:58 CDT
====================================================================== 
Summary:                    [patch] Add manager command shell for accessing the
system shell
Description: 
This is just a quick patch for doing a system call from manager.

action:shell: Manager command "shell" - executes a command as if you were
at the shell environment

syntax:

action: shell
command: echo "haha" > /verifyworks


Will execute that command at the shell.

action: shell
command: echo "you'll see this in the return message"
getvar: true

________________________________________________________________

Current problems, if you do a system command, from the gui, try to
get the input back, will it freeze the connection if shell does not
return?

Example:
action: shell
command: while true; do echo "this will never exit :/" ; done
getvar: true

If getvar was not set, it should be fine. I am not sure of a way to
prevent
the user from doing this anyways. 



====================================================================== 

---------------------------------------------------------------------- 
 Corydon76 - 08-02-07 06:58  
---------------------------------------------------------------------- 
If we continue down this path, I would suggest that you create another
permissions level in manager for this command alone.  As others have noted,
this is a dangerous command, and it should be restricted as best as
possible.

Far more important to be added to manager commands are the analogs to CLI
commands, so future admins can turn off the somewhat dangerous Command
functionality for all but themselves, without limiting the useful
functionality of AMI. 

Issue History 
Date Modified   Username       Field                    Change               
====================================================================== 
08-02-07 06:58  Corydon76      Note Added: 0068303                          
======================================================================




More information about the asterisk-bugs mailing list