CVE-2020-28361

Name
CVE-2020-28361
Description
Kamailio before 5.4.0, as used in Sip Express Router (SER) in Sippy Softswitch 4.5 through 5.2 and other products, allows a bypass of a header-removal protection mechanism via whitespace characters. This occurs in the remove_hf function in the Kamailio textops module. Particular use of remove_hf in Sippy Softswitch may allow skilled attacker having a valid credential in the system to disrupt internal call start/duration accounting mechanisms leading potentially to a loss of revenue.
NVD Severity
medium
Other trackers
Mailing lists
Exploits
Forges
GitHub (code, issues), Aports (code, issues)

References

Type URI
Permissions Required https://support.sippysoft.com/support/discussions/topics/3000179616
Exploit https://packetstormsecurity.com/files/159030/Kamailio-5.4.0-Header-Smuggling.html

Match rules

CPE URI Source package Min version Max version
cpe:2.3:a:kamailio:kamailio:*:*:*:*:*:*:*:* kamailio >= None < 5.4.0

Vulnerable and fixed packages

Source package Branch Version Maintainer Status
kamailio 3.11-main 5.2.5-r1 Nathan Angelacos <nangel@alpinelinux.org> possibly vulnerable
kamailio 3.10-main 5.2.5-r0 Nathan Angelacos <nangel@alpinelinux.org> possibly vulnerable
kamailio 3.12-main 5.3.7-r2 Nathan Angelacos <nangel@alpinelinux.org> possibly vulnerable