Page 6 of 35 results (0.010 seconds)

CVSS: 7.4EPSS: 0%CPEs: 1EXPL: 0

It is possible to exploit a Time of Check & Time of Use (TOCTOU) vulnerability by winning a race condition when Kaseya Virtual System Administrator agent 9.3.0.11 and earlier tries to execute its binaries from working and/or temporary folders. Successful exploitation results in the execution of arbitrary programs with "NT AUTHORITY\SYSTEM" privileges. Es posible explotar una vulnerabilidad Time of Check Time of Use (TOCTOU) al ganar una condición de carrera cuando las versiones 9.3.0.11 y anteriores del agente Kaseya Virtual System Administrator intentan ejecutar sus binarios de las carpetas de trabajo y/o temporales. Resultados de explotación exitosos en la ejecución de programas arbitrarios con privilegios "NT AUTHORITY\SYSTEM". The Kaseya Virtual System Administrator (VSA) agent "AgentMon.exe" suffers from a local privilege escalation vulnerability. • http://www.securityfocus.com/archive/1/541884/100/0/threaded • CWE-362: Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition') •

CVSS: 9.8EPSS: 2%CPEs: 1EXPL: 2

It was discovered that the Unitrends Backup (UB) before 10.1.0 user interface was exposed to an authentication bypass, which then could allow an unauthenticated user to inject arbitrary commands into its /api/hosts parameters using backquotes. Se ha descubierto que en Unitrends Backup (UB), en versiones anteriores a la 10.1.0, la interfaz de usuario estaba expuesta a una omisión de autenticación. Esto podría permitir que un usuario no autenticado inyecte comandos arbitrarios en los parámetros /api/hosts mediante acentos graves (`). It was discovered that the api/storage web interface in Unitrends Backup (UB) before 10.0.0 has an issue in which one of its input parameters was not validated. A remote attacker could use this flaw to bypass authentication and execute arbitrary commands with root privilege on the target system. • https://www.exploit-db.com/exploits/44297 https://www.exploit-db.com/exploits/45559 https://support.unitrends.com/UnitrendsBackup/s/article/000001150 https://support.unitrends.com/UnitrendsBackup/s/article/000006002 https://support.unitrends.com/UnitrendsBackup/s/article/ka640000000TO5PAAW/000005756 https://nvd.nist.gov/vuln/detail/CVE-2017-12478 http://blog.redactedsec.net/exploits/2018/01/29/UEB9.html • CWE-287: Improper Authentication •

CVSS: 10.0EPSS: 58%CPEs: 1EXPL: 2

It was discovered that the bpserverd proprietary protocol in Unitrends Backup (UB) before 10.0.0, as invoked through xinetd, has an issue in which its authentication can be bypassed. A remote attacker could use this issue to execute arbitrary commands with root privilege on the target system. Se ha descubierto que el protocolo propietario bpserverd en Unitrends Backup (UB) en versiones anteriores a la 10.0.0, cuando se invoca a través de xinetd, tiene un problema que permite omitir la autenticación. Un atacante remoto podría emplear este problema para ejecutar comandos arbitrarios con privilegios root en el sistema objetivo. It was discovered that the Unitrends bpserverd proprietary protocol, as exposed via xinetd, has an issue in which its authentication can be bypassed. • https://www.exploit-db.com/exploits/42957 https://www.exploit-db.com/exploits/43031 https://support.unitrends.com/UnitrendsBackup/s/article/000005755 https://support.unitrends.com/UnitrendsBackup/s/article/ka640000000CcZeAAK/000005755 https://nvd.nist.gov/vuln/detail/CVE-2017-12477 • CWE-287: Improper Authentication •

CVSS: 10.0EPSS: 6%CPEs: 1EXPL: 3

It was discovered that the api/storage web interface in Unitrends Backup (UB) before 10.0.0 has an issue in which one of its input parameters was not validated. A remote attacker could use this flaw to bypass authentication and execute arbitrary commands with root privilege on the target system. Se ha descubierto que la interfaz web api/storage en Unitrends Backup (UB) en versiones anteriores a la 10.0.0 tiene un problema por el cual uno de sus parámetros de entrada no fue validado. Un atacante remoto podría emplear este fallo para eludir la autenticación y ejecutar comandos arbitrarios con privilegios root en el sistema objetivo. It was discovered that the api/storage web interface in Unitrends Backup (UB) before 10.0.0 has an issue in which one of its input parameters was not validated. • https://www.exploit-db.com/exploits/42958 https://www.exploit-db.com/exploits/45559 https://www.exploit-db.com/exploits/43030 https://support.unitrends.com/UnitrendsBackup/s/article/000005756 https://support.unitrends.com/UnitrendsBackup/s/article/ka640000000TO5PAAW/000005756 https://support.unitrends.com/UnitrendsBackup/s/article/000006002 https://nvd.nist.gov/vuln/detail/CVE-2017-12478 http://blog.redactedsec.net/exploits/2018/01/29/UEB9.html • CWE-287: Improper Authentication •

CVSS: 9.0EPSS: 0%CPEs: 1EXPL: 1

It was discovered that an issue in the session logic in Unitrends Backup (UB) before 10.0.0 allowed using the LOGDIR environment variable during a web session to elevate an existing low-privilege user to root privileges. A remote attacker with existing low-privilege credentials could then execute arbitrary commands with root privileges. Se ha descubierto que un problema en la lógica de sesión en Unitrends Backup (UB) en versiones anteriores a la 10.0.0 permitía emplear la variable de entorno LOGDIR durante una sesión web para elevar a un usuario existente con pocos privilegios a la categoría root. Un atacante remoto que tenga credenciales con pocos privilegios podría ejecutar comandos arbitrarios con privilegios root. Unitrends UEB version 9.1 suffers from a privilege escalation vulnerability. • https://www.exploit-db.com/exploits/42959 https://support.unitrends.com/UnitrendsBackup/s/article/000005757 •