Privilege Escalation From user to SYSTEM via unauthenticated command execution
Critical
U
Ubiquiti Inc.
Submitted None
Actions:
Reported by
b0yd
Vulnerability Details
Technical details and impact analysis
The vulnerability, or feature depending how you look at it, is the ability to execute commands using the
evostream API interface that is exposed on localhost:7440. Since the evostream service is running as SYSTEM a user can use the launchprocess command, http://docs.evostream.com/2.0/launchProcess.html, to execute any binary with supplied arguments. The only thing that is keeping this "feature" from allowing remote code execution is the fact that it listens on localhost only. However, if it were couple with an SSRF, an attacker could achieve full remote code execution.
## Impact
The ability to run arbitrary commands as SYSTEM from any user.
Report Details
Additional information and metadata
State
Closed
Substate
Resolved
Submitted
Weakness
Command Injection - Generic