Vulnerability & Exploit Database

Back to search

Unitrends Enterprise Backup bpserverd Privilege Escalation

It was discovered that the Unitrends bpserverd proprietary protocol, as exposed via xinetd, has an issue in which its authentication can be bypassed. A remote attacker could use this issue to execute arbitrary commands with root privilege on the target system. This is very similar to exploits/linux/misc/ueb9_bpserverd however it runs against the localhost by dropping a python script on the local file system. Unitrends stopped bpserverd from listening remotely on version 10.

Free Metasploit Download

Get your copy of the world's leading penetration testing tool

 Download Now

Module Name

exploit/linux/local/ueb_bpserverd_privesc

Authors

  • Cale Smith
  • Benny Husted
  • Jared Arave
  • h00die

References

Targets

  • UEB <= 10.0

Platforms

  • linux

Architectures

  • x86

Reliability

Development

Module Options

To display the available options, load the module within the Metasploit console and run the commands 'show options' or 'show advanced':

msf > use exploit/linux/local/ueb_bpserverd_privesc msf exploit(ueb_bpserverd_privesc) > show targets ...targets... msf exploit(ueb_bpserverd_privesc) > set TARGET <target-id> msf exploit(ueb_bpserverd_privesc) > show options ...show and set options... msf exploit(ueb_bpserverd_privesc) > exploit