{"api_version":"1","generated_at":"2026-04-23T12:19:51+00:00","cve":"CVE-2017-14001","urls":{"html":"https://cve.report/CVE-2017-14001","api":"https://cve.report/api/cve/CVE-2017-14001.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2017-14001","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2017-14001"},"summary":{"title":"CVE-2017-14001","description":"An Improper Neutralization of Special Elements used in an OS Command issue was discovered in Digium Asterisk GUI 2.1.0 and prior. An OS command injection vulnerability has been identified that may allow the execution of arbitrary code on the system through the inclusion of OS commands in the URL request of the program.","state":"PUBLIC","assigner":"ics-cert@hq.dhs.gov","published_at":"2017-09-26 02:29:00","updated_at":"2019-10-09 23:23:00"},"problem_types":["CWE-78"],"metrics":[],"references":[{"url":"https://ics-cert.us-cert.gov/advisories/ICSA-17-264-03","name":"https://ics-cert.us-cert.gov/advisories/ICSA-17-264-03","refsource":"MISC","tags":["Third Party Advisory","US Government Resource"],"title":"Digium Asterisk GUI | ICS-CERT","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www.securityfocus.com/bid/100950","name":"100950","refsource":"BID","tags":["Third Party Advisory","VDB Entry"],"title":"Digium Asterisk GUI CVE-2017-14001 OS Command Injection Vulnerability","mime":"text/html","httpstatus":"200","archivestatus":"0"},{"url":"https://www.cve.org/CVERecord?id=CVE-2017-14001","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2017-14001","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[{"cve_year":"2017","cve_id":"14001","vulnerable":"1","versionEndIncluding":"2.1.0","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"digium","cpe5":"asterisk_gui","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"}],"vendor_comments":[],"enrichments":{"kev":null,"epss":null,"legacy_qids":[]},"source_records":{"cve_program":{"CVE_data_meta":{"ASSIGNER":"ics-cert@hq.dhs.gov","ID":"CVE-2017-14001","STATE":"PUBLIC"},"affects":{"vendor":{"vendor_data":[{"product":{"product_data":[{"product_name":"Digium Asterisk GUI","version":{"version_data":[{"version_value":"Digium Asterisk GUI"}]}}]},"vendor_name":"n/a"}]}},"data_format":"MITRE","data_type":"CVE","data_version":"4.0","description":{"description_data":[{"lang":"eng","value":"An Improper Neutralization of Special Elements used in an OS Command issue was discovered in Digium Asterisk GUI 2.1.0 and prior. An OS command injection vulnerability has been identified that may allow the execution of arbitrary code on the system through the inclusion of OS commands in the URL request of the program."}]},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"CWE-78"}]}]},"references":{"reference_data":[{"name":"https://ics-cert.us-cert.gov/advisories/ICSA-17-264-03","refsource":"MISC","url":"https://ics-cert.us-cert.gov/advisories/ICSA-17-264-03"},{"name":"100950","refsource":"BID","url":"http://www.securityfocus.com/bid/100950"}]}},"nvd":{"publishedDate":"2017-09-26 02:29:00","lastModifiedDate":"2019-10-09 23:23:00","problem_types":["CWE-78"],"metrics":{"baseMetricV3":{"cvssV3":{"version":"3.0","vectorString":"CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH","baseScore":8.8,"baseSeverity":"HIGH"},"exploitabilityScore":2.8,"impactScore":5.9},"baseMetricV2":{"cvssV2":{"version":"2.0","vectorString":"AV:N/AC:L/Au:S/C:C/I:C/A:C","accessVector":"NETWORK","accessComplexity":"LOW","authentication":"SINGLE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE","baseScore":9},"severity":"HIGH","exploitabilityScore":8,"impactScore":10,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}},"configurations":{"CVE_data_version":"4.0","nodes":[{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:digium:asterisk_gui:*:*:*:*:*:*:*:*","versionEndIncluding":"2.1.0","cpe_name":[]}]}]}},"legacy_mitre":{"record":{"CveYear":"2017","CveId":"14001","Ordinal":"111426","Title":"CVE-2017-14001","CVE":"CVE-2017-14001","Year":"2017"},"notes":[{"CveYear":"2017","CveId":"14001","Ordinal":"1","NoteData":"An Improper Neutralization of Special Elements used in an OS Command issue was discovered in Digium Asterisk GUI 2.1.0 and prior. An OS command injection vulnerability has been identified that may allow the execution of arbitrary code on the system through the inclusion of OS commands in the URL request of the program.","Type":"Description","Title":null},{"CveYear":"2017","CveId":"14001","Ordinal":"2","NoteData":"2017-09-25","Type":"Other","Title":"Published"},{"CveYear":"2017","CveId":"14001","Ordinal":"3","NoteData":"2017-09-26","Type":"Other","Title":"Modified"}]}}}