module

Unitrends UEB http api remote code execution

Disclosed
2017-08-08
Created
2019-03-19

Description

It was discovered that the api/storage web interface in Unitrends Backup (UB)
before 10.0.0 has an issue in which one of its input parameters was not validated.
A remote attacker could use this flaw to bypass authentication and execute arbitrary
commands with root privilege on the target system.
UEB v9 runs the api under root privileges and api/storage is vulnerable.
UEB v10 runs the api under limited privileges and api/hosts is vulnerable.

Authors

Cale Smith
Benny Husted
Jared Arave
h00die

Platform

Linux

Architectures

x86

Module Options

To display the available options, load the module within the Metasploit console and run the commands ‘show options’ or ‘show advanced’:


msf > use exploit/linux/http/ueb_api_rce
msf exploit(ueb_api_rce) > show targets
...targets...
msf exploit(ueb_api_rce) > set TARGET < target-id >
msf exploit(ueb_api_rce) > show options
...show and set options...
msf exploit(ueb_api_rce) > exploit

Title
NEW

Explore Exposure Command

Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.