Couldn't this be a huge security vulnerability used to inject arbitrary commands into a session in FreeSWITCH?<span></span><br><br>On Wednesday, April 22, 2015, Luis Azedo <<a href="mailto:luis.azedo@factorlusitano.com">luis.azedo@factorlusitano.com</a>> wrote:<br><blockquote class="gmail_quote" style="margin:0 0 0 .8ex;border-left:1px #ccc solid;padding-left:1ex">Hi,<br>
<br>
i need a inline custom action passed with an INVITE msg with a replaces header<br>
or a better to use this scenario.<br>
<br>
right now, for calls with replaces header there is support for sla,<br>
intercept and attendant transfer.<br>
<br>
my problem is that intercept requires the bridge_uuid which is not set<br>
on one leg calls (on hold playing music) so the intercept condition<br>
won't be hit.<br>
<br>
the attendant transfer takes app/data applies and then hangs up the call.<br>
<br>
i need a simple answer,intercept:(sip->sip_replaces->rp_call_id)<br>
instead of bridge_uuid.<br>
<br>
i tried to set signal_bond and originate_signal_bound on the channel<br>
to see if i could bypass this, but with no luck.<br>
<br>
i created a small patch that i am attaching here with the hope that<br>
FreeSWITCH will look and possibly merge it.<br>
<br>
Best<br>
</blockquote>