<div dir="ltr"><div class="gmail_extra"><div class="gmail_quote"><blockquote class="gmail_quote" style="margin:0 0 0 .8ex;border-left:1px #ccc solid;padding-left:1ex">Couldn't this be a huge security vulnerability used to inject arbitrary commands into a session in FreeSWITCH?<span></span><br><br></blockquote><div><br></div><div>isn't the call authenticated first ? anyway, an option can be added to sip_profile to allow this.</div><div>Â </div><blockquote class="gmail_quote" style="margin:0 0 0 .8ex;border-left:1px #ccc solid;padding-left:1ex"><div>why don't you pass the call to mod_perl or Lua, and do all the<br></div>
necessary lookups in the script? This shpouldn;t be a big deal to<br>
implement, and much more safe than patching mod_sofia.<br>
<br></blockquote><div>not an option, but thanks for suggesting </div><blockquote class="gmail_quote" style="margin:0 0 0 .8ex;border-left:1px #ccc solid;padding-left:1ex"><div dir="ltr"><div class="gmail_extra"><div class="gmail_quote"><blockquote class="gmail_quote" style="margin:0 0 0 .8ex;border-left:1px #ccc solid;padding-left:1ex"><div><div><blockquote class="gmail_quote" style="margin:0 0 0 .8ex;border-left:1px #ccc solid;padding-left:1ex"><div dir="ltr"><div><br></div></div></blockquote></div></div></blockquote></div></div></div></blockquote></div></div></div>