Vulnerability Details : CVE-2020-28361
Kamailio before 5.4.0, as used in Sip Express Router (SER) in Sippy Softswitch 4.5 through 5.2 and other products, allows a bypass of a header-removal protection mechanism via whitespace characters. This occurs in the remove_hf function in the Kamailio textops module. Particular use of remove_hf in Sippy Softswitch may allow skilled attacker having a valid credential in the system to disrupt internal call start/duration accounting mechanisms leading potentially to a loss of revenue.
Products affected by CVE-2020-28361
- cpe:2.3:a:kamailio:kamailio:*:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2020-28361
0.07%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 26 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2020-28361
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
5.5
|
MEDIUM | AV:N/AC:L/Au:S/C:P/I:P/A:N |
8.0
|
4.9
|
NIST | |
5.4
|
MEDIUM | CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N |
2.8
|
2.5
|
NIST |
CWE ids for CVE-2020-28361
-
The product acts as an intermediary HTTP agent (such as a proxy or firewall) in the data flow between two entities such as a client and server, but it does not interpret malformed HTTP requests or responses in ways that are consistent with how the messages will be processed by those entities that are at the ultimate destination.Assigned by: nvd@nist.gov (Primary)
References for CVE-2020-28361
-
https://support.sippysoft.com/support/discussions/topics/3000179616
Sign into : Sippy Software, Inc.Permissions Required
-
https://packetstormsecurity.com/files/159030/Kamailio-5.4.0-Header-Smuggling.html
Kamailio 5.4.0 Header Smuggling ≈ Packet StormExploit;Third Party Advisory;VDB Entry
Jump to