CVE-2017-10816

9.8 CRITICAL

📋 TL;DR

This is a critical SQL injection vulnerability in MaLion for Windows and Mac versions 5.0.0 to 5.2.1. Remote attackers can execute arbitrary SQL commands via the Relay Service Server, potentially leading to complete system compromise. Organizations using affected MaLion versions are at risk.

💻 Affected Systems

Products:
  • MaLion for Windows
  • MaLion for Mac
Versions: 5.0.0 to 5.2.1
Operating Systems: Windows, macOS
Default Config Vulnerable: ⚠️ Yes
Notes: Relay Service Server component is vulnerable. All installations within affected version range are vulnerable by default.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system takeover, data exfiltration, lateral movement within network, and persistent backdoor installation.

🟠

Likely Case

Database compromise, credential theft, and unauthorized access to sensitive information stored in MaLion systems.

🟢

If Mitigated

Limited impact with proper network segmentation, database permissions, and input validation controls in place.

🌐 Internet-Facing: HIGH
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

SQL injection vulnerabilities are typically easy to exploit with readily available tools. The CVSS 9.8 score indicates trivial exploitation.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 5.2.2 or later

Vendor Advisory: http://www.intercom.co.jp/information/2017/0801.html

Restart Required: Yes

Instructions:

1. Download MaLion version 5.2.2 or later from official vendor site. 2. Stop MaLion services. 3. Install the updated version. 4. Restart services. 5. Verify successful update.

🔧 Temporary Workarounds

Network Segmentation

all

Isolate MaLion Relay Service Server from untrusted networks and internet access

Database Permission Reduction

all

Limit database user permissions to minimum required functionality

🧯 If You Can't Patch

  • Implement strict network access controls to limit exposure of Relay Service Server
  • Deploy web application firewall with SQL injection protection rules

🔍 How to Verify

Check if Vulnerable:

Check MaLion version in application settings or installation directory. Versions 5.0.0 through 5.2.1 are vulnerable.

Check Version:

Check application About menu or installation properties

Verify Fix Applied:

Confirm MaLion version is 5.2.2 or later. Test Relay Service Server functionality remains operational.

📡 Detection & Monitoring

Log Indicators:

  • Unusual SQL queries in database logs
  • Multiple failed authentication attempts
  • Unexpected database schema changes

Network Indicators:

  • SQL syntax patterns in network traffic to Relay Service Server
  • Unusual outbound database connections

SIEM Query:

source="malion_logs" AND (sql OR injection OR UNION OR SELECT*)

🔗 References

📤 Share & Export