Asterisk 20.11.1: Keeping Hackers Out of Your Files!
The Asterisk Development Team has released Asterisk 20.11.1, a security update that patches a path traversal vulnerability via AMI ListCategories. This action now restricts access to files outside the configuration directory. Grab your update now and avoid unwanted file adventures!

Hot Take:
In a world where your average hacker is just a path traversal away from a system breach, the Asterisk Development Team has stepped in like a bouncer at a nightclub, keeping the party confined to the designated area. With their latest security patch, Asterisk 20.11.1, they’ve put the kibosh on those pesky path-traversing hooligans trying to crash the configuration directory party. Who needs a VIP section when you’ve got directory restrictions? Cheers to safer dial plans and drama-free deployments!
Key Points:
- Release of Asterisk 20.11.1 focuses on fixing a specific security vulnerability.
- The vulnerability involved path traversal via the AMI ListCategories action.
- The ListCategories action is now restricted to the configuration directory.
- Security advisory GHSA-33×6-fj46-6rfh is addressed in this release.
- The release includes contributions from developer Ben Ford.