Asterisk 20.11.1: Keeping Hackers Out of Your Files!

The Asterisk Development Team has released Asterisk 20.11.1, a security update that patches a path traversal vulnerability via AMI ListCategories. This action now restricts access to files outside the configuration directory. Grab your update now and avoid unwanted file adventures!

Pro Dashboard

Hot Take:

In a world where your average hacker is just a path traversal away from a system breach, the Asterisk Development Team has stepped in like a bouncer at a nightclub, keeping the party confined to the designated area. With their latest security patch, Asterisk 20.11.1, they’ve put the kibosh on those pesky path-traversing hooligans trying to crash the configuration directory party. Who needs a VIP section when you’ve got directory restrictions? Cheers to safer dial plans and drama-free deployments!

Key Points:

  • Release of Asterisk 20.11.1 focuses on fixing a specific security vulnerability.
  • The vulnerability involved path traversal via the AMI ListCategories action.
  • The ListCategories action is now restricted to the configuration directory.
  • Security advisory GHSA-33×6-fj46-6rfh is addressed in this release.
  • The release includes contributions from developer Ben Ford.

Membership Required

 You must be a member to access this content.

View Membership Levels
Already a member? Log in here
The Nimble Nerd
Confessional Booth of Our Digital Sins

Okay, deep breath, let's get this over with. In the grand act of digital self-sabotage, we've littered this site with cookies. Yep, we did that. Why? So your highness can have a 'premium' experience or whatever. These traitorous cookies hide in your browser, eagerly waiting to welcome you back like a guilty dog that's just chewed your favorite shoe. And, if that's not enough, they also tattle on which parts of our sad little corner of the web you obsess over. Feels dirty, doesn't it?