This is a summary of the AI-generated 10-question deep analysis. The full version (longer answers, follow-up Q&A, related CVEs) requires login. Read the full analysis β
Q1What is this vulnerability? (Essence + Consequences)
π¨ **Essence**: A critical security flaw in Unitrends Backup (UB) UI. π **Consequences**: Attackers can bypass authentication and execute arbitrary system commands via the `/api/hosts` parameter using backticks.β¦
π‘οΈ **Root Cause**: Improper input validation leading to **Command Injection**. π **Flaw**: The UI fails to sanitize backtick characters (`) in the `/api/hosts` input, allowing shell command execution.β¦
π’ **Vendor**: Unitrends (US). π¦ **Product**: Unitrends Backup (UB). π **Affected**: Versions **prior to 10.1.0**. π« **Safe**: Version 10.1.0 and later are patched.
Q4What can hackers do? (Privileges/Data)
π **Privileges**: Bypasses authentication entirely! π₯οΈ **Action**: Injects arbitrary commands. π **Data**: Can access/modify any data the service account has access to. π **Scope**: Remote code execution potential.
Q5Is exploitation threshold high? (Auth/Config)
β‘ **Threshold**: **LOW**. πͺ **Auth**: Bypasses login! No valid credentials needed. π― **Config**: Requires network access to the `/api/hosts` endpoint. πΆ **Remote**: Exploitable remotely.
Q6Is there a public Exp? (PoC/Wild Exploitation)
π₯ **Public Exp**: **YES**. π **Exploit-DB**: CVE-2018-6328 has public exploits (IDs 45559, 44297). π **Wild Exploitation**: Active in the wild. β οΈ **Warning**: High risk of automated attacks.
Q7How to self-check? (Features/Scanning)
π **Check**: Scan for Unitrends Backup services. π‘ **Probe**: Test `/api/hosts` endpoint for command injection via backticks. π **Version**: Verify if version < 10.1.0.β¦
β **Fixed**: **YES**. π₯ **Patch**: Upgrade to **Unitrends Backup 10.1.0** or later. π **Source**: Official support articles confirm the fix. π **Action**: Immediate update required.
Q9What if no patch? (Workaround)
π§ **Workaround**: If patching is delayed, block external access to `/api/hosts`. π **Network**: Restrict API endpoints via firewall/WAF. π **Access Control**: Ensure strict IP whitelisting for the backup interface.β¦