vendor:
up.time
by:
Ewerson 'Crash' Guimaraes
8.8
CVSS
HIGH
Arbitrary Command Execution
78
CWE
Product Name: up.time
Affected Version From: 7.5.0 (build 16)
Affected Version To: 7.4.0 (build 13)
Patch Exists: NO
Related CWE: N/A
CPE: 2.3:a:idera_inc:up.time:7.5.0:*:*:*:*:*:*:*
Metasploit:
N/A
Other Scripts:
N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References:
N/A
Nuclei Metadata: N/A
Platforms Tested: Jetty, PHP/5.4.34, MySQL, Apache/2.2.29 (Win64) mod_ssl/2.2.29 OpenSSL/1.0.1j PHP/5.4.34
2015
up.time 7.5.0 Upload And Execute File Exploit
up.time suffers from arbitrary command execution. Attackers can exploit this issue using the monitor service feature and adding a command with respected arguments to given binary for execution. In combination with the CSRF, Privilege Escalation, Arbitrary text file creation and renaming that file to php for example in arbitrary location and executing system commands with SYSTEM privileges.
Mitigation:
Ensure that the application is not vulnerable to CSRF, Privilege Escalation, Arbitrary text file creation and renaming that file to php for example in arbitrary location and executing system commands with SYSTEM privileges.