CVE-2025-67722 (CNNVD-202512-3128)

MEDIUM
中文标题:
FreePBX 代码问题漏洞
英文标题:
Authenticated amportal search for ‘freepbx_engine’ in non root writeable directories leads to potential privilege escalation
CVSS分数: 5.7
发布时间: 2025-12-16 00:14:18
漏洞类型: 代码问题
状态: PUBLISHED
数据质量分数: 0.40
数据版本: v3
漏洞描述
中文描述:

FreePBX(前称Asterisk Management Portal)是FreePBX项目的一套通过GUI(基于网页的图形化接口)配置Asterisk(IP电话系统)的工具。 FreePBX 16.0.45之前版本和17.0.24之前版本存在代码问题漏洞,该漏洞源于amportal脚本存在权限提升问题,可能导致执行任意代码。

英文描述:

FreePBX is an open-source web-based graphical user interface (GUI) that manages Asterisk. Prior to versions 16.0.45 and 17.0.24 of the FreePBX framework, an authenticated local privilege escalation exists in the deprecated FreePBX startup script `amportal`. In the deprecated `amportal` utility, the lookup for the `freepbx_engine` file occurs in `/etc/asterisk/` directories. Typically, these are configured by FreePBX as writable by the **asterisk** user and any members of the **asterisk** group. This means that a member of the **asterisk** group can add their own `freepbx_engine` file in `/etc/asterisk/` and upon `amportal` executing, it would exec that file with root permissions (even though the file was created and placed by a non-root user). Version 16.0.45 and 17.0.24 contain a fix for the issue. Other mitigation strategies are also available. Confirm only trusted local OS system users are members of the `asterisk` group. Look for suspicious files in the `/etc/asterisk/` directory (via Admin -> Config Edit in the GUI, or via CLI). Double-check that `live_dangerously = no` is set (or unconfigured, as the default is **no**) in `/etc/asterisk/asterisk.conf` file. Eliminate any unsafe custom use of Asterisk dial plan applications and functions that potentially can manipulate the file system, e.g., System(), FILE(), etc.

CWE类型:
CWE-426
标签:
(暂无数据)
受影响产品
厂商 产品 版本 版本范围 平台 CPE
FreePBX security-reporting < 16.0.45 - - cpe:2.3:a:freepbx:security-reporting:<_16.0.45:*:*:*:*:*:*:*
FreePBX security-reporting >= 17.0.0, < 17.0.24 - - cpe:2.3:a:freepbx:security-reporting:>=_17.0.0,_<_17.0.24:*:*:*:*:*:*:*
sangoma freepbx * - - cpe:2.3:a:sangoma:freepbx:*:*:*:*:*:*:*:*
解决方案
中文解决方案:
(暂无数据)
英文解决方案:
(暂无数据)
临时解决方案:
(暂无数据)
参考链接
https://github.com/FreePBX/security-reporting/security/advisories/GHSA-p42w-v77m-hfp8 x_refsource_CONFIRM
cve.org
访问
https://www.freepbx.org/watch-what-we-do-with-security-fixes-%f0%9f%91%80 x_refsource_MISC
cve.org
访问
CVSS评分详情
4.0 (cna)
MEDIUM
5.7
CVSS向量: CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U
机密性
HIGH
完整性
HIGH
可用性
HIGH
后续系统影响 (Subsequent):
机密性
NONE
完整性
NONE
可用性
NONE
时间信息
发布时间:
2025-12-16 00:14:18
修改时间:
2025-12-17 04:56:05
创建时间:
2026-01-12 02:12:27
更新时间:
2026-01-26 02:11:37
利用信息
暂无可利用代码信息
数据源详情
数据源 记录ID 版本 提取时间
CVE cve_CVE-2025-67722 2025-12-19 03:24:32 2026-01-12 02:12:27
NVD nvd_CVE-2025-67722 2025-12-19 03:25:38 2026-01-12 02:28:08
CNNVD cnnvd_CNNVD-202512-3128 2026-01-11 06:15:03 2026-01-12 02:38:02
版本与语言
当前版本: v3
主要语言: EN
支持语言:
EN ZH
安全公告
暂无安全公告信息
变更历史
v3 CNNVD
2026-01-12 02:38:02
vulnerability_type: 未提取 → 代码问题; cnnvd_id: 未提取 → CNNVD-202512-3128; data_sources: ['cve', 'nvd'] → ['cnnvd', 'cve', 'nvd']
查看详细变更
  • vulnerability_type: 未提取 -> 代码问题
  • cnnvd_id: 未提取 -> CNNVD-202512-3128
  • data_sources: ['cve', 'nvd'] -> ['cnnvd', 'cve', 'nvd']
v2 NVD
2026-01-12 02:28:08
affected_products_count: 2 → 3; data_sources: ['cve'] → ['cve', 'nvd']
查看详细变更
  • affected_products_count: 2 -> 3
  • data_sources: ['cve'] -> ['cve', 'nvd']