CVE-2017-10861
📋 TL;DR
This directory traversal vulnerability in QND Advance/Standard allows attackers to read arbitrary files on the server by manipulating file paths in commands. It affects organizations using Qualitysoft's QND software, potentially exposing sensitive configuration files, credentials, or other critical data.
💻 Affected Systems
- QND Advance
- QND Standard
📦 What is this software?
⚠️ Risk & Real-World Impact
Worst Case
Complete system compromise through reading sensitive files like configuration files containing credentials, SSH keys, or database passwords, leading to lateral movement and data exfiltration.
Likely Case
Unauthorized access to sensitive files containing application configuration, user data, or system information that could enable further attacks.
If Mitigated
Limited impact with proper file permissions, network segmentation, and monitoring in place to detect and block traversal attempts.
🎯 Exploit Status
Directory traversal vulnerabilities are well-understood and easy to exploit. Public references indicate the vulnerability is documented and likely has exploit code available.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Check Qualitysoft vendor advisory for specific patched versions
Vendor Advisory: http://www.qualitysoft.com/qnd_vulnerabilities
Restart Required: Yes
Instructions:
1. Contact Qualitysoft support for the latest patched version. 2. Backup current configuration and data. 3. Install the patched version following vendor instructions. 4. Restart the QND service. 5. Verify the fix by testing traversal attempts.
🔧 Temporary Workarounds
Input Validation and Sanitization
allImplement strict input validation to reject any file paths containing directory traversal sequences like ../ or ..\
Implement in application code: if (path.contains("..") || path.contains("%2e%2e")) { reject_input(); }
File System Permissions Restriction
allRun QND service with minimal file system permissions, restricting access to only necessary directories.
chmod 750 /path/to/qnd/data (Linux)
icacls "C:\Program Files\QND" /deny "Users:(OI)(CI)(RX)" (Windows)
🧯 If You Can't Patch
- Implement network segmentation to isolate QND servers from sensitive systems and restrict access to trusted IPs only.
- Deploy a web application firewall (WAF) with rules to block directory traversal patterns in requests.
🔍 How to Verify
Check if Vulnerable:
Test by attempting to access files outside the intended directory using traversal sequences (e.g., ../../etc/passwd on Linux or ..\..\windows\win.ini on Windows) via QND commands.
Check Version:
Check QND application version through its admin interface or configuration files. On Linux: cat /opt/qnd/version.txt. On Windows: Check registry or installation directory.
Verify Fix Applied:
After patching, repeat the traversal tests. Successful attempts should be blocked or return errors instead of file contents.
📡 Detection & Monitoring
Log Indicators:
- Log entries showing file access attempts with ../ or ..\ sequences
- Failed authentication attempts followed by file access patterns
Network Indicators:
- HTTP/network requests containing directory traversal patterns in parameters
- Unusual file access patterns from single IPs
SIEM Query:
source="qnd_logs" AND ("..\" OR "../" OR "%2e%2e")