Rocket U2 UniData < 7.3 unidata72 RPC Interface Call Parsing Arbitrary Command Execution

critical Nessus Plugin ID 59642

Synopsis

A remote service allows unauthenticated command execution.

Description

The UniData RPC server listening on the remote host does not enforce authentication on the unidata72 interface. A remote, unauthenticated attacker can exploit this issue and execute arbitrary code on the host as a privileged user.

Solution

Upgrade to UniData 7.3 or later.

See Also

https://www.upsploit.com/index.php/advisories/view/UPS-2012-0012

Plugin Details

Severity: Critical

ID: 59642

File Name: unidata_command_execution.nbin

Version: 1.72

Type: remote

Family: Databases

Published: 6/21/2012

Updated: 3/19/2024

Configuration: Enable thorough checks

Supported Sensors: Nessus

Risk Information

CVSS v2

Risk Factor: Critical

Base Score: 10

Temporal Score: 7.4

Vector: CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C

Vulnerability Information

CPE: x-cpe:/a:rocketsoftware:unidata

Exploit Ease: No known exploits are available

Patch Publication Date: 6/9/2012

Vulnerability Publication Date: 6/9/2012

Reference Information

BID: 53974