10
CVSSv2

CVE-2017-12478

Published: 07/08/2017 Updated: 16/12/2021
CVSS v2 Base Score: 10 | Impact Score: 10 | Exploitability Score: 10
CVSS v3 Base Score: 9.8 | Impact Score: 5.9 | Exploitability Score: 3.9
VMScore: 1000
Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C

Vulnerability Summary

It exists that the api/storage web interface in Unitrends Backup (UB) prior to 10.0.0 has an issue in which one of its input parameters was not validated. A remote attacker could use this flaw to bypass authentication and execute arbitrary commands with root privilege on the target system.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

kaseya unitrends backup

Exploits

# Exploit Title: Unauthenticated root RCE for Unitrends UEB 91 # Date: 08/08/2017 # Exploit Authors: Cale Smith, Benny Husted, Jared Arave # Contact: twittercom/iotennui || twittercom/BennyHusted || twittercom/0xC413 # Vendor Homepage: wwwunitrendscom/ # Software Link: wwwunitrendscom/download/enterpr ...
## # This module requires Metasploit: metasploitcom/download # Current source: githubcom/rapid7/metasploit-framework ## class MetasploitModule < Msf::Exploit::Remote Rank = ExcellentRanking include Msf::Exploit::Remote::HttpClient include Msf::Exploit::CmdStager def initialize(info = {}) super(update_info(info, ...
## # This module requires Metasploit: metasploitcom/download # Current source: githubcom/rapid7/metasploit-framework ## class MetasploitModule < Msf::Exploit::Remote Rank = ExcellentRanking include Msf::Exploit::Remote::HttpClient include Msf::Exploit::CmdStager def initialize(info = {}) super(update_info(info, ...
It was discovered that the api/storage web interface in Unitrends Backup (UB) before 1000 has an issue in which one of its input parameters was not validated A remote attacker could use this flaw to bypass authentication and execute arbitrary commands with root privilege on the target system ...
It was discovered that the api/storage web interface in Unitrends Backup (UB) before 1000 has an issue in which one of its input parameters was not validated A remote attacker could use this flaw to bypass authentication and execute arbitrary commands with root privilege on the target system UEB v9 runs the api under root privileges and api/sto ...
Unitrends UEB version 91 suffers from authentication bypass and remote command execution vulnerabilities ...