cve/2023/CVE-2023-28503.md

21 lines
1.2 KiB
Markdown
Raw Normal View History

2024-05-25 21:48:12 +02:00
### [CVE-2023-28503](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-28503)
![](https://img.shields.io/static/v1?label=Product&message=UniData&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=UniVerse&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=0%3C%2011.3.5.1001%20&color=brighgreen)
![](https://img.shields.io/static/v1?label=Version&message=0%3C%208.2.43.3003%20&color=brighgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-798%20Use%20of%20Hard-coded%20Credentials&color=brighgreen)
### Description
Rocket Software UniData versions prior to 8.2.4 build 3003 and UniVerse versions prior to 11.3.5 build 1001 or 12.2.1 build 2002 suffer from an authentication bypass vulnerability, where a special username with a deterministic password can be leveraged to bypass authentication checks and execute OS commands as the root user.
### POC
#### Reference
- http://packetstormsecurity.com/files/171854/Rocket-Software-Unidata-udadmin_server-Authentication-Bypass.html
- https://www.rapid7.com/blog/post/2023/03/29/multiple-vulnerabilities-in-rocket-software-unirpc-server-fixed/
#### Github
- https://github.com/Network-Sec/bin-tools-pub