CVE-2020-37153

ASTPP · Open Source Smart VoIP Billing Solution

ASTPP 4.0.1 is vulnerable to XSS and command injection in SIP and plugin management interfaces, allowing attackers to hijack sessions and execute code with root permissions.

Executive summary

ASTPP 4.0.1 contains multiple critical flaws that enable attackers to gain root-level access and hijack administrator sessions through command injection and XSS.

Vulnerability

The application suffers from multiple flaws including cross-site scripting (XSS) and command injection within the SIP device configuration and plugin management modules. Attackers can leverage these to inject system commands or manipulate cron tasks to achieve root-level code execution.

Business impact

The compromise of a VoIP billing solution can lead to massive financial fraud, interception of sensitive communication data, and total system takeover. The CVSS score of 9.8 highlights the critical nature of these flaws, as they can lead to full administrative compromise and persistent access via cron manipulation.

Remediation

Immediate Action: Upgrade ASTPP installations to the latest stable version where these vulnerabilities have been addressed.

Proactive Monitoring: Monitor system cron jobs for unauthorized changes and audit administrator session logs for suspicious activity or session hijacking indicators.

Compensating Controls: Use a WAF to filter malicious input in SIP configuration fields and enforce strict IP whitelisting for the management interface.

Exploitation status

Public Exploit Available: No

Analyst recommendation

Given the potential for root-level access and the sensitive nature of VoIP billing data, this vulnerability must be addressed with high urgency. Administrators should move away from version 4.0.1 immediately and conduct a thorough audit of their system configurations for any signs of past tampering.