Loading HuntDB...

Privilege Escalation From user to SYSTEM via unauthenticated command execution

Critical
U
Ubiquiti Inc.
Submitted None
Reported by b0yd

Vulnerability Details

Technical details and impact analysis

Command Injection - Generic
The vulnerability, or feature depending how you look at it, is the ability to execute commands using the evostream API interface that is exposed on localhost:7440. Since the evostream service is running as SYSTEM a user can use the launchprocess command, http://docs.evostream.com/2.0/launchProcess.html, to execute any binary with supplied arguments. The only thing that is keeping this "feature" from allowing remote code execution is the fact that it listens on localhost only. However, if it were couple with an SSRF, an attacker could achieve full remote code execution. ## Impact The ability to run arbitrary commands as SYSTEM from any user.

Report Details

Additional information and metadata

State

Closed

Substate

Resolved

Submitted

Weakness

Command Injection - Generic