header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

Unitrends UEB 9 http api/storage remote root

It was discovered that the api/storage web interface in Unitrends Backup (UB) before 10.0.0 has an issue in which one of its input parameters was not validated. A remote attacker could use this flaw to bypass authentication and execute arbitrary commands with root privilege on the target system.

Unauthenticated root RCE for Unitrends UEB 9.1

This exploit allows an attacker to gain unauthenticated root remote code execution on Unitrends UEB 9.1. It takes advantage of a vulnerability in the xinetd process, allowing the attacker to send a specially crafted packet that contains a command to be executed as root. The exploit requires making a second connection to a specified port and receiving command output from that connection. Even if the command output is not needed, the second connection is still necessary for the command to be executed.

Authenticated lowpriv RCE for Unitrends UEB 9.1

This exploit utilizes some issues in UEB9 session handling to place a php exec one liner in the webroot of the appliance. Session tokens are used to authenticate as a low priv user and modify the LOG_DIR field to point to a directory in the web root with apache user write access. This allows the attacker to execute arbitrary commands.

Unitrends Enterprise Backup bpserverd Privilege Escalation

It was discovered that the Unitrends bpserverd proprietary protocol, as exposed via xinetd, has an issue in which its authentication can be bypassed. A remote attacker could use this issue to execute arbitrary commands with root privilege on the target system. This is very similar to exploits/linux/misc/ueb9_bpserverd however it runs against the localhost by dropping a python script on the local file system. Unitrends stopped bpserverd from listening remotely on version 10.

Nagios XI 5.2.[6-9], 5.3, 5.4 Chained Remote Root

This exploit leverages the vulnerabilities enumerated in these CVES: [ CVE-2018-8733, CVE-2018-8734, CVE-2018-8735, CVE-2018-8736 ]. More details here: http://blog.redactedsec.net/exploits/2018/04/26/nagios.html. Steps are as follows: 0. Determine Version 1. Change the database user to root:nagiosxi 2. Get an API key w/ SQLi 3. Use the API Key to add an administrative user 4. Login as that administrative user 5. Do some authenticated RCE w/ privesc 6. Cleanup.

Unitrends UEB bpserverd authentication bypass RCE

It was discovered that the Unitrends bpserverd proprietary protocol, as exposed via xinetd, has an issue in which its authentication can be bypassed. A remote attacker could use this issue to execute arbitrary commands with root privilege on the target system.

Unitrends UEB http api remote code execution

It was discovered that the api/storage web interface in Unitrends Backup (UB) before 10.0.0 has an issue in which one of its input parameters was not validated. A remote attacker could use this flaw to bypass authentication and execute arbitrary commands with root privilege on the target system. UEB v9 runs the api under root privileges and api/storage is vulnerable. UEB v10 runs the api under limited privileges and api/hosts is vulnerable.

Unauthenticated root RCE for Unitrends UEB 10.0

A sqli + low priv remote RCE vulnerability is used to establish a low priv remote shell from the UEB 10 host. A local privesc exploit containing the desired command is uploaded to the host using this shell, and executed. The initial low priv shell is closed, and the local privesc script is deleted.

Recent Exploits: