First published: Wed Apr 01 2020(Updated: )
The UniFi Video Server v3.9.3 and prior (for Windows 7/8/10 x64) web interface Firmware Update functionality, under certain circumstances, does not validate firmware download destinations to ensure they are within the intended destination directory tree. It accepts a request with a URL to firmware update information. If the version field contains ..\ character sequences, the destination file path to save the firmware can be manipulated to be outside the intended destination directory tree. Fixed in UniFi Video Controller v3.10.3 and newer.
Credit: support@hackerone.com
Affected Software | Affected Version | How to fix |
---|---|---|
Ui Unifi Video | <=3.9.3 | |
Microsoft Windows |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID of this UniFi Video Server vulnerability is CVE-2020-8144.
The severity of CVE-2020-8144 is high.
The affected software version for CVE-2020-8144 is UniFi Video Server v3.9.3 and prior (for Windows 7/8/10 x64).
The UniFi Video Server v3.9.3 and prior (for Windows 7/8/10 x64) web interface Firmware Update functionality, under certain circumstances, does not validate firmware download destinations to ensure they are within the intended destination directory tree.
No, Microsoft Windows is not affected by CVE-2020-8144.
To fix CVE-2020-8144, it is recommended to update to a version of UniFi Video Server that is not vulnerable.
You can find more information about CVE-2020-8144 in the following reference: [Security advisory bulletin](https://community.ui.com/releases/Security-advisory-bulletin-006-006/3cf6264e-e0e6-4e26-a331-1d271f84673e)