Ubiquiti UCRM versions 2.3.0 to 2.7.7 allow an authenticated user to read arbitrary files in the local file system. Note that by default, the local file system is isolated in a docker container. Successful exploitation requires valid credentials to an account with "Edit" access to "System Customization".
References
Link | Resource |
---|---|
https://community.ubnt.com/t5/UCRM/New-UCRM-upgrades-available-2-8-2-and-2-9-0-beta3/td-p/2211814 | Vendor Advisory |
https://hackerone.com/reports/301406 | Third Party Advisory |
https://community.ubnt.com/t5/UCRM/New-UCRM-upgrades-available-2-8-2-and-2-9-0-beta3/td-p/2211814 | Vendor Advisory |
https://hackerone.com/reports/301406 | Third Party Advisory |
Configurations
History
21 Nov 2024, 03:03
Type | Values Removed | Values Added |
---|---|---|
References | () https://community.ubnt.com/t5/UCRM/New-UCRM-upgrades-available-2-8-2-and-2-9-0-beta3/td-p/2211814 - Vendor Advisory | |
References | () https://hackerone.com/reports/301406 - Third Party Advisory |
Information
Published : 2018-07-03 21:29
Updated : 2024-11-21 03:03
NVD link : CVE-2017-0913
Mitre link : CVE-2017-0913
CVE.ORG link : CVE-2017-0913
JSON object : View
Products Affected
ubnt
- ucrm
CWE
CWE-732
Incorrect Permission Assignment for Critical Resource