Lucene search

K
hackeroneB0ydH1:544928
HistoryApr 22, 2019 - 12:58 a.m.

Ubiquiti Inc.: Privilege Escalation From user to SYSTEM via unauthenticated command execution

2019-04-2200:58:17
b0yd
hackerone.com
16

0.003 Low

EPSS

Percentile

65.2%

The vulnerability, or feature depending how you look at it, is the ability to execute commands using the
evostream API interface that is exposed on localhost:7440. Since the evostream service is running as SYSTEM a user can use the launchprocess command, http://docs.evostream.com/2.0/launchProcess.html, to execute any binary with supplied arguments. The only thing that is keeping this β€œfeature” from allowing remote code execution is the fact that it listens on localhost only. However, if it were couple with an SSRF, an attacker could achieve full remote code execution.

Impact

The ability to run arbitrary commands as SYSTEM from any user.

0.003 Low

EPSS

Percentile

65.2%

Related for H1:544928