Vulnerability Details : CVE-2017-7282
An issue was discovered in Unitrends Enterprise Backup before 9.1.1. The function downloadFile in api/includes/restore.php blindly accepts any filename passed to /api/restore/download as valid. This allows an authenticated attacker to read any file in the filesystem that the web server has access to, aka Local File Inclusion (LFI).
Vulnerability category: File inclusionInformation leak
Products affected by CVE-2017-7282
- cpe:2.3:a:unitrends:enterprise_backup:*:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2017-7282
0.07%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 28 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2017-7282
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
7.1
|
HIGH | AV:N/AC:M/Au:N/C:C/I:N/A:N |
8.6
|
6.9
|
NIST | |
5.5
|
MEDIUM | CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N |
1.8
|
3.6
|
NIST |
CWE ids for CVE-2017-7282
-
The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information.Assigned by: nvd@nist.gov (Primary)
References for CVE-2017-7282
-
https://rhinosecuritylabs.com/research/remote-code-execution-bug-hunting-chapter-2/
Unitrends Vulnerability Hunting: Remote Code Execution (CVE-2017-7280) - Chapter 2 - Rhino Security LabsExploit;Third Party Advisory
-
https://support.unitrends.com/UnitrendsBackup/s/article/ka640000000CcWGAA0/000005558?r=1
CVE-2017-7282: Unitrends LFI in restore.php filenameVendor Advisory
Jump to