vendor:
Ucopia
by:
agix
9,8
CVSS
HIGH
Remote Code Execution
78
CWE
Product Name: Ucopia
Affected Version From: <= 5.1
Affected Version To: <= 5.1
Patch Exists: Yes
Related CWE: N/A
CPE: a:ucopia:ucopia
Metasploit:
N/A
Other Scripts:
N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References:
N/A
Nuclei Metadata: N/A
Platforms Tested: None
2017
Unauthenticated remote root code execution on captive portal Ucopia <= 5.1
When a user connects to Ucopia wifi guest, every request is redirected to controller.access.network. An easier to use php backdoor can be created by sending a request to controller.access.network/autoconnect_redirector.php. As php is in sudoers without password, a request can be sent to controller.access.network/upload/bd.php to execute commands with sudo privileges. An ssh key can be pushed to the server to gain root access.
Mitigation:
Ensure that the Ucopia captive portal is updated to the latest version.