CVE-2020-37153

9.8 CRITICAL

📋 TL;DR

CVE-2020-37153 allows attackers to execute arbitrary system commands and perform cross-site scripting attacks in ASTPP VoIP billing software. This can lead to complete system compromise, session hijacking, and privilege escalation to root. Organizations running vulnerable ASTPP versions are affected.

💻 Affected Systems

Products:
  • ASTPP (Open Source VoIP Billing Solution)
Versions: 4.0.1 and likely earlier versions
Operating Systems: Linux
Default Config Vulnerable: ⚠️ Yes
Notes: Vulnerabilities exist in SIP device configuration and plugin management interfaces. Systems with web interface exposed are particularly vulnerable.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full system compromise with root privileges, data exfiltration, installation of persistent backdoors, and use as pivot point for network attacks.

🟠

Likely Case

Remote code execution leading to service disruption, credential theft, and installation of cryptocurrency miners or ransomware.

🟢

If Mitigated

Limited impact with proper network segmentation, but still potential for service disruption if exploited.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: CONFIRMED
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploit requires authentication but can be combined with XSS to hijack sessions. Public exploit code available on Exploit-DB.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 4.0.2 or later

Vendor Advisory: https://github.com/iNextrix/ASTPP

Restart Required: Yes

Instructions:

1. Backup current installation and database. 2. Download latest version from official repository. 3. Follow upgrade instructions in documentation. 4. Restart web server and verify functionality.

🔧 Temporary Workarounds

Network Segmentation

linux

Restrict access to ASTPP web interface to trusted IP addresses only

iptables -A INPUT -p tcp --dport 80 -s TRUSTED_IP -j ACCEPT
iptables -A INPUT -p tcp --dport 443 -s TRUSTED_IP -j ACCEPT
iptables -A INPUT -p tcp --dport 80 -j DROP
iptables -A INPUT -p tcp --dport 443 -j DROP

Web Application Firewall

all

Deploy WAF with rules to block command injection and XSS patterns

🧯 If You Can't Patch

  • Implement strict input validation and output encoding in affected interfaces
  • Disable or restrict plugin management and SIP device configuration interfaces

🔍 How to Verify

Check if Vulnerable:

Check ASTPP version in web interface admin panel or via command: grep 'version' /var/www/html/astpp/application/config/version.php

Check Version:

grep "\$config['version']" /var/www/html/astpp/application/config/version.php

Verify Fix Applied:

Verify version is 4.0.2 or higher and test that command injection payloads are properly sanitized

📡 Detection & Monitoring

Log Indicators:

  • Unusual cron job entries in /var/log/cron
  • Web server logs showing command injection patterns (; | ` $() )
  • Multiple failed login attempts followed by successful admin login

Network Indicators:

  • Unusual outbound connections from ASTPP server
  • Traffic to known malicious IPs or domains

SIEM Query:

source="web_access.log" AND ("cmd=" OR "exec=" OR "system=" OR "passthru=" OR "shell_exec=") AND dest_ip="ASTPP_SERVER_IP"

🔗 References

📤 Share & Export