Page 4 of 19 results (0.002 seconds)

CVSS: 9.8EPSS: 2%CPEs: 1EXPL: 2

It was discovered that the Unitrends Backup (UB) before 10.1.0 user interface was exposed to an authentication bypass, which then could allow an unauthenticated user to inject arbitrary commands into its /api/hosts parameters using backquotes. Se ha descubierto que en Unitrends Backup (UB), en versiones anteriores a la 10.1.0, la interfaz de usuario estaba expuesta a una omisión de autenticación. Esto podría permitir que un usuario no autenticado inyecte comandos arbitrarios en los parámetros /api/hosts mediante acentos graves (`). It was discovered that the api/storage web interface in Unitrends Backup (UB) before 10.0.0 has an issue in which one of its input parameters was not validated. A remote attacker could use this flaw to bypass authentication and execute arbitrary commands with root privilege on the target system. • https://www.exploit-db.com/exploits/44297 https://www.exploit-db.com/exploits/45559 https://support.unitrends.com/UnitrendsBackup/s/article/000001150 https://support.unitrends.com/UnitrendsBackup/s/article/000006002 https://support.unitrends.com/UnitrendsBackup/s/article/ka640000000TO5PAAW/000005756 https://nvd.nist.gov/vuln/detail/CVE-2017-12478 http://blog.redactedsec.net/exploits/2018/01/29/UEB9.html • CWE-287: Improper Authentication •

CVSS: 10.0EPSS: 58%CPEs: 1EXPL: 2

It was discovered that the bpserverd proprietary protocol in Unitrends Backup (UB) before 10.0.0, as invoked through xinetd, has an issue in which its authentication can be bypassed. A remote attacker could use this issue to execute arbitrary commands with root privilege on the target system. Se ha descubierto que el protocolo propietario bpserverd en Unitrends Backup (UB) en versiones anteriores a la 10.0.0, cuando se invoca a través de xinetd, tiene un problema que permite omitir la autenticación. Un atacante remoto podría emplear este problema para ejecutar comandos arbitrarios con privilegios root en el sistema objetivo. It was discovered that the Unitrends bpserverd proprietary protocol, as exposed via xinetd, has an issue in which its authentication can be bypassed. • https://www.exploit-db.com/exploits/42957 https://www.exploit-db.com/exploits/43031 https://support.unitrends.com/UnitrendsBackup/s/article/000005755 https://support.unitrends.com/UnitrendsBackup/s/article/ka640000000CcZeAAK/000005755 https://nvd.nist.gov/vuln/detail/CVE-2017-12477 • CWE-287: Improper Authentication •

CVSS: 10.0EPSS: 6%CPEs: 1EXPL: 3

It was discovered that the api/storage web interface in Unitrends Backup (UB) before 10.0.0 has an issue in which one of its input parameters was not validated. A remote attacker could use this flaw to bypass authentication and execute arbitrary commands with root privilege on the target system. Se ha descubierto que la interfaz web api/storage en Unitrends Backup (UB) en versiones anteriores a la 10.0.0 tiene un problema por el cual uno de sus parámetros de entrada no fue validado. Un atacante remoto podría emplear este fallo para eludir la autenticación y ejecutar comandos arbitrarios con privilegios root en el sistema objetivo. It was discovered that the api/storage web interface in Unitrends Backup (UB) before 10.0.0 has an issue in which one of its input parameters was not validated. • https://www.exploit-db.com/exploits/42958 https://www.exploit-db.com/exploits/45559 https://www.exploit-db.com/exploits/43030 https://support.unitrends.com/UnitrendsBackup/s/article/000005756 https://support.unitrends.com/UnitrendsBackup/s/article/ka640000000TO5PAAW/000005756 https://support.unitrends.com/UnitrendsBackup/s/article/000006002 https://nvd.nist.gov/vuln/detail/CVE-2017-12478 http://blog.redactedsec.net/exploits/2018/01/29/UEB9.html • CWE-287: Improper Authentication •

CVSS: 9.0EPSS: 0%CPEs: 1EXPL: 1

It was discovered that an issue in the session logic in Unitrends Backup (UB) before 10.0.0 allowed using the LOGDIR environment variable during a web session to elevate an existing low-privilege user to root privileges. A remote attacker with existing low-privilege credentials could then execute arbitrary commands with root privileges. Se ha descubierto que un problema en la lógica de sesión en Unitrends Backup (UB) en versiones anteriores a la 10.0.0 permitía emplear la variable de entorno LOGDIR durante una sesión web para elevar a un usuario existente con pocos privilegios a la categoría root. Un atacante remoto que tenga credenciales con pocos privilegios podría ejecutar comandos arbitrarios con privilegios root. Unitrends UEB version 9.1 suffers from a privilege escalation vulnerability. • https://www.exploit-db.com/exploits/42959 https://support.unitrends.com/UnitrendsBackup/s/article/000005757 •