Vigil@nce - Vigil@nce - Asterisk Open Source: Server-Side Request Forgery via res_stir_shaken, analyzed on 15/04/2022
June 2022 by Vigil@nce
Vigil@nce - An attacker can trigger a Server-Side Request Forgery of Asterisk Open Source, via res_stir_shaken, in order to force the server to send queries.
Plus d'information sur : https://vigilance.fr/vulnerability/Asterisk-Open-Source-Server-Side-Request-Forgery-via-res-stir-shaken-38087