04/12/2017
An issue was discovered in api/includes/systems.php in Unitrends Enterprise Backup before 9.0.0. User input is not properly filtered before being sent to a popen function. This allows for remote code execution by sending a specially crafted user variable.
Unitrends Enterprise Backup Remote Code Execution in reports.php File
[CVE-2017-7281]
Unitrends Enterprise Backup Remote Code Execution in restore.php File
[CVE-2017-7283]
Unitrends Enterprise Backup Privilege Escalation in users.php File
[CVE-2017-7284]
Unitrends Enterprise Backup Privilege Escalation in Token Cookie
[CVE-2017-7279]
Unitrends Enterprise Backup Local File Inclusion
[CVE-2017-7282]
9.8 (Critical)
5.9
3.9
Network
Attack Complexity (AC)Low Privileges Required (PR)None User Interaction (UI)None Scope (S)Unchanged
Confidentiality (C)High Integrity (I)High Availability (A)High