vendor:
Ubus Authentication Protocol
by:
Anonymous
7,8
CVSS
HIGH
Authentication Bypass
287
CWE
Product Name: Ubus Authentication Protocol
Affected Version From: Unknown
Affected Version To: Unknown
Patch Exists: Yes
Related CWE: CVE-2017-9077
CPE: N/A
Metasploit:
https://www.rapid7.com/db/vulnerabilities/amazon_linux-cve-2017-9077/, https://www.rapid7.com/db/vulnerabilities/debian-cve-2017-9077/, https://www.rapid7.com/db/vulnerabilities/oracle_linux-cve-2017-9077/, https://www.rapid7.com/db/vulnerabilities/redhat_linux-cve-2017-9077/, https://www.rapid7.com/db/vulnerabilities/huawei-euleros-2_0_sp1-cve-2017-9077/, https://www.rapid7.com/db/vulnerabilities/huawei-euleros-2_0_sp2-cve-2017-9077/, https://www.rapid7.com/db/vulnerabilities/centos_linux-cve-2017-9077/, https://www.rapid7.com/db/vulnerabilities/f5-big-ip-cve-2017-9077/, https://www.rapid7.com/db/vulnerabilities/suse-cve-2017-9077/, https://www.rapid7.com/db/vulnerabilities/ubuntu-cve-2017-9077/
Other Scripts:
N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References:
N/A
Nuclei Metadata: N/A
Platforms Tested: Linux
2017
Ubus Authentication Bypass Vulnerability
This exploit is related to a vulnerability in the Ubus authentication protocol, which allows an attacker to bypass authentication and gain access to the system. The exploit involves sending a malicious payload to the system, which is then executed by the system. This payload contains a command to add a Samba share and an SSH key to the system, which allows the attacker to gain access to the system.
Mitigation:
The best way to mitigate this vulnerability is to ensure that the system is running the latest version of the Ubus authentication protocol, and that all users have strong passwords.