X-Git-Url: http://git.openwrt.org/?a=blobdiff_plain;f=net%2Fasterisk-15.x%2Fpatches%2F190-AST-2019-007-16.diff;fp=net%2Fasterisk-15.x%2Fpatches%2F190-AST-2019-007-16.diff;h=0f187c11876af822f36e5ddea2c9e451296f04b3;hb=7b2b386421540995e8158849e06500d6af452c3d;hp=0000000000000000000000000000000000000000;hpb=74e09c7c8334905b9c728c72260f18c229d079e1;p=feed%2Ftelephony.git diff --git a/net/asterisk-15.x/patches/190-AST-2019-007-16.diff b/net/asterisk-15.x/patches/190-AST-2019-007-16.diff new file mode 100644 index 0000000..0f187c1 --- /dev/null +++ b/net/asterisk-15.x/patches/190-AST-2019-007-16.diff @@ -0,0 +1,46 @@ +From 7574be5110e049a44b8c8ead52cd1c2a5d442afa Mon Sep 17 00:00:00 2001 +From: George Joseph +Date: Thu, 24 Oct 2019 11:41:23 -0600 +Subject: [PATCH] manager.c: Prevent the Originate action from running the Originate app + +If an AMI user without the "system" authorization calls the +Originate AMI command with the Originate application, +the second Originate could run the "System" command. + +Action: Originate +Channel: Local/1111 +Application: Originate +Data: Local/2222,app,System,touch /tmp/owned + +If the "system" authorization isn't set, we now block the +Originate app as well as the System, Exec, etc. apps. + +ASTERISK-28580 +Reported by: Eliel Sardañons + +Change-Id: Ic4c9dedc34c426f03c8c14fce334a71386d8a5fa +--- + +diff --git a/doc/UPGRADE-staging/AMI-Originate.txt b/doc/UPGRADE-staging/AMI-Originate.txt +new file mode 100644 +index 0000000..f2d3133 +--- /dev/null ++++ b/doc/UPGRADE-staging/AMI-Originate.txt +@@ -0,0 +1,5 @@ ++Subject: AMI ++ ++The AMI Originate action, which optionally takes a dialplan application as ++an argument, no longer accepts "Originate" as the application due to ++security concerns. +diff --git a/main/manager.c b/main/manager.c +index f138801..1963151 100644 +--- a/main/manager.c ++++ b/main/manager.c +@@ -5744,6 +5744,7 @@ + EAGI(/bin/rm,-rf /) */ + strcasestr(app, "mixmonitor") || /* MixMonitor(blah,,rm -rf) */ + strcasestr(app, "externalivr") || /* ExternalIVR(rm -rf) */ ++ strcasestr(app, "originate") || /* Originate(Local/1234,app,System,rm -rf) */ + (strstr(appdata, "SHELL") && (bad_appdata = 1)) || /* NoOp(${SHELL(rm -rf /)}) */ + (strstr(appdata, "EVAL") && (bad_appdata = 1)) /* NoOp(${EVAL(${some_var_containing_SHELL})}) */ + )) {