[UNIX] Asterisk CallerID CDR SQL Injection
From: SecuriTeam (support_at_securiteam.com)
To: firstname.lastname@example.org Date: 16 Sep 2003 15:37:08 +0200
The following security advisory is sent to the securiteam mailing list, and can be found at the SecuriTeam web site: http://www.securiteam.com
- - promotion
The SecuriTeam alerts list - Free, Accurate, Independent.
Get your security news from a reliable source.
- - - - - - - - -
Asterisk CallerID CDR SQL Injection
<http://www.asterisk.org/> Asterisk is a complete PBX (Private Branch
eXchange) in software. It runs on Linux and provides all of the features
you would expect from a PBX and more. Asterisk does voice over IP with
three protocols (SIP, IAX v1 and v2, and H323), and can interoperate with
almost all standards-based telephony equipment using relatively
Call Detail Records (CDRs) are generated by telephony systems in order to
perform a number of functions such as billing and rating. CDRs contain a
number of fields that identify useful information about the call including
source, destination, and other items such as CallerID. These can be
generated numerous times during the call to indicate the state of the call
@stake found an issue while conducting a source code review of the CDR
logging functionality. It is possible to perform SQL injection if an
attacker can supply a malformed CallerID string.
The interesting thing to note about this vulnerability is that is cannot
only be launched via VoIP protocols, but also through fixed-line
connections (i.e. POTS - Plain Old Telephone System).
@stake discovered that minimal input validation occurred between CDR
generation and the acceptance of this data as part of the SQL query.
SQL injection is covered in details in:
1) SQL Injection -
2) Advanced SQL Injection -
As a result, it is possible for a remote unauthenticated user to perform
arbitrary database operations.
@stake notified the author of this particular code on the 17th of August.
The author developed and deployed a patch silently to the CVS on the 9th
@stake recommends that if you have not deployed a CVS version since the
9th of September 2003 to immediately do so.
The original advisory can be downloaded from:
The information has been provided by <mailto:email@example.com>
This bulletin is sent to members of the SecuriTeam mailing list.
To unsubscribe from the list, send mail with an empty subject line and body to: firstname.lastname@example.org
In order to subscribe to the mailing list, simply forward this email to: email@example.com
The information in this bulletin is provided "AS IS" without warranty of any kind.
In no event shall we be liable for any damages whatsoever including direct, indirect, incidental, consequential, loss of business profits or special damages.