CVE-2022-26651
Severity CVSS v4.0:
Pending analysis
Type:
CWE-89
SQL Injection
Publication date:
15/04/2022
Last modified:
02/02/2023
Description
An issue was discovered in Asterisk through 19.x and Certified Asterisk through 16.8-cert13. The func_odbc module provides possibly inadequate escaping functionality for backslash characters in SQL queries, resulting in user-provided data creating a broken SQL query or possibly a SQL injection. This is fixed in 16.25.2, 18.11.2, and 19.3.2, and 16.8-cert14.
Impact
Base Score 3.x
9.80
Severity 3.x
CRITICAL
Base Score 2.0
7.50
Severity 2.0
HIGH
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:a:digium:asterisk:*:*:*:*:*:*:*:* | 16.0.0 (including) | 16.25.2 (excluding) |
| cpe:2.3:a:digium:asterisk:*:*:*:*:*:*:*:* | 18.0 (including) | 18.11.2 (excluding) |
| cpe:2.3:a:digium:asterisk:*:*:*:*:*:*:*:* | 19.0.0 (including) | 19.3.2 (excluding) |
| cpe:2.3:a:digium:certified_asterisk:16.8:-:*:*:*:*:*:* | ||
| cpe:2.3:a:digium:certified_asterisk:16.8:cert1-rc1:*:*:*:*:*:* | ||
| cpe:2.3:a:digium:certified_asterisk:16.8:cert1-rc2:*:*:*:*:*:* | ||
| cpe:2.3:a:digium:certified_asterisk:16.8:cert1-rc3:*:*:*:*:*:* | ||
| cpe:2.3:a:digium:certified_asterisk:16.8:cert1-rc4:*:*:*:*:*:* | ||
| cpe:2.3:a:digium:certified_asterisk:16.8:cert10:*:*:*:*:*:* | ||
| cpe:2.3:a:digium:certified_asterisk:16.8:cert11:*:*:*:*:*:* | ||
| cpe:2.3:a:digium:certified_asterisk:16.8:cert12:*:*:*:*:*:* | ||
| cpe:2.3:a:digium:certified_asterisk:16.8:cert13:*:*:*:*:*:* | ||
| cpe:2.3:a:digium:certified_asterisk:16.8:cert2:*:*:*:*:*:* | ||
| cpe:2.3:a:digium:certified_asterisk:16.8:cert3:*:*:*:*:*:* | ||
| cpe:2.3:a:digium:certified_asterisk:16.8:cert4:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- http://packetstormsecurity.com/files/166746/Asterisk-Project-Security-Advisory-AST-2022-003.html
- https://downloads.asterisk.org/pub/security/
- https://downloads.asterisk.org/pub/security/AST-2022-003.html
- https://lists.debian.org/debian-lts-announce/2022/11/msg00021.html
- https://www.debian.org/security/2022/dsa-5285



