Cloud Defense Logo

Products

Solutions

Company

Book A Live Demo

CVE-2017-7283 : Security Advisory and Response

Learn about CVE-2017-7283, a security flaw in Unitrends Enterprise Backup versions before 9.1.2 allowing authenticated users to run unauthorized OS commands via specially crafted filenames.

Unitrends Enterprise Backup versions prior to 9.1.2 allow authenticated users to execute arbitrary OS commands by manipulating filenames in a specific endpoint.

Understanding CVE-2017-7283

A security vulnerability in Unitrends Enterprise Backup versions before 9.1.2 enables authorized users to run unauthorized operating system commands.

What is CVE-2017-7283?

This CVE allows a verified user in Unitrends Enterprise Backup versions earlier than 9.1.2 to execute any desired operating system commands by providing a specially crafted filename to the /api/restore/download-files endpoint.

The Impact of CVE-2017-7283

The vulnerability grants unauthorized access to execute arbitrary commands, posing a significant security risk to affected systems.

Technical Details of CVE-2017-7283

This section provides in-depth technical insights into the CVE-2017-7283 vulnerability.

Vulnerability Description

An authenticated user in Unitrends Enterprise Backup versions before 9.1.2 can exploit the flaw by sending a uniquely designed filename to the /api/restore/download-files endpoint, linked to the downloadFiles function in api/includes/restore.php.

Affected Systems and Versions

        Product: Unitrends Enterprise Backup
        Versions affected: Earlier than 9.1.2

Exploitation Mechanism

The vulnerability is exploited by manipulating filenames in the /api/restore/download-files endpoint, allowing users to execute unauthorized OS commands.

Mitigation and Prevention

Protect your systems from CVE-2017-7283 with the following measures:

Immediate Steps to Take

        Upgrade Unitrends Enterprise Backup to version 9.1.2 or later.
        Monitor and restrict user access to critical system functions.

Long-Term Security Practices

        Regularly audit and review user permissions and access levels.
        Implement network segmentation to limit the impact of potential breaches.

Patching and Updates

        Apply security patches and updates provided by Unitrends to address the vulnerability.

Popular CVEs

CVE Id

Published Date

Is your System Free of Underlying Vulnerabilities?
Find Out Now