An issue was discovered in Kaseya Unitrends Backup Appliance before 10.5.5. The apache user could read arbitrary files such as /etc/shadow by abusing an insecure Sudo rule.
References
Link | Resource |
---|---|
https://helpdesk.kaseya.com/hc/en-gb/articles/4412762258961 | Vendor Advisory |
https://www.cyberonesecurity.com/blog/exploiting-kaseya-unitrends-backup-appliance-part-1 | Exploit Third Party Advisory |
https://www.cyberonesecurity.com/blog/exploiting-kaseya-unitrends-backup-appliance-part-2 | Exploit Third Party Advisory |
Configurations
History
28 Nov 2022, 21:19
Type | Values Removed | Values Added |
---|---|---|
References | (MISC) https://www.cyberonesecurity.com/blog/exploiting-kaseya-unitrends-backup-appliance-part-1 - Exploit, Third Party Advisory | |
References | (MISC) https://www.cyberonesecurity.com/blog/exploiting-kaseya-unitrends-backup-appliance-part-2 - Exploit, Third Party Advisory |
23 Nov 2022, 19:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
12 Jul 2022, 17:42
Type | Values Removed | Values Added |
---|---|---|
CWE | NVD-CWE-Other |
06 Dec 2021, 17:11
Type | Values Removed | Values Added |
---|---|---|
CWE | CWE-668 | |
References | (MISC) https://helpdesk.kaseya.com/hc/en-gb/articles/4412762258961 - Vendor Advisory | |
CPE | cpe:2.3:a:kaseya:unitrends_backup:*:*:*:*:*:*:*:* | |
CVSS |
v2 : v3 : |
v2 : 4.0
v3 : 6.5 |
06 Dec 2021, 04:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2021-12-06 04:15
Updated : 2024-02-04 22:08
NVD link : CVE-2021-43043
Mitre link : CVE-2021-43043
CVE.ORG link : CVE-2021-43043
JSON object : View
Products Affected
kaseya
- unitrends_backup
CWE