Vulnerability Details : CVE-2018-6328
Public exploit exists!
It was discovered that the Unitrends Backup (UB) before 10.1.0 user interface was exposed to an authentication bypass, which then could allow an unauthenticated user to inject arbitrary commands into its /api/hosts parameters using backquotes.
Vulnerability category: BypassGain privilege
Products affected by CVE-2018-6328
- cpe:2.3:a:kaseya:unitrends_backup:*:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2018-6328
2.08%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 89 %
Percentile, the proportion of vulnerabilities that are scored at or less
Metasploit modules for CVE-2018-6328
-
Unitrends UEB http api remote code execution
Disclosure Date: 2017-08-08First seen: 2020-04-26exploit/linux/http/ueb_api_rceIt was discovered that the api/storage web interface in Unitrends Backup (UB) before 10.0.0 has an issue in which one of its input parameters was not validated. A remote attacker could use this flaw to bypass authentication and execute arbitrary commands with root pr
CVSS scores for CVE-2018-6328
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
7.5
|
HIGH | AV:N/AC:L/Au:N/C:P/I:P/A:P |
10.0
|
6.4
|
NIST | |
9.8
|
CRITICAL | CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H |
3.9
|
5.9
|
NIST |
CWE ids for CVE-2018-6328
-
When an actor claims to have a given identity, the product does not prove or insufficiently proves that the claim is correct.Assigned by: nvd@nist.gov (Primary)
References for CVE-2018-6328
-
https://www.exploit-db.com/exploits/45559/
Unitrends UEB - HTTP API Remote Code Execution (Metasploit)Exploit;Third Party Advisory;VDB Entry
-
https://www.exploit-db.com/exploits/44297/
Unitrends UEB 10.0 - Root Remote Code ExecutionExploit;Third Party Advisory;VDB Entry
-
https://support.unitrends.com/UnitrendsBackup/s/article/000001150
Unitrends Response to certain security vulnerabilities (CVEs) - Reference ArticleVendor Advisory
-
https://support.unitrends.com/UnitrendsBackup/s/article/000006002
Article DetailVendor Advisory
Jump to