CVE-2017-13707

9.8 CRITICAL

📋 TL;DR

CVE-2017-13707 is a privilege escalation vulnerability in Replibit Backup Manager that allows authenticated attackers to gain root privileges by exploiting sudo misconfiguration. Attackers can use the vi editor through sudo to modify critical system files like /etc/passwd. This affects organizations using Replibit Backup Manager versions before 2017.08.04.

💻 Affected Systems

Products:
  • Replibit Backup Manager
Versions: All versions earlier than 2017.08.04
Operating Systems: Linux-based systems running Replibit
Default Config Vulnerable: ⚠️ Yes
Notes: Requires authenticated access to the system; default sudo configuration allows vi execution with elevated privileges.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise with root access, allowing attackers to create new privileged accounts, install persistent backdoors, steal all data, and pivot to other systems.

🟠

Likely Case

Privileged attackers gaining full administrative control over the backup system, potentially compromising backup integrity and accessing sensitive backup data.

🟢

If Mitigated

Limited impact if proper sudo configuration and least privilege principles are enforced, restricting unauthorized sudo access.

🌐 Internet-Facing: MEDIUM - While exploitation requires authentication, internet-facing backup systems could be targeted after initial access.
🏢 Internal Only: HIGH - Internal attackers or compromised accounts can easily escalate privileges to root.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: CONFIRMED
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation is straightforward using sudo vi to spawn a root shell; public exploit code is available.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 2017.08.04

Vendor Advisory: https://github.com/Wh1t3Rh1n0/exploits/blob/master/2017-08-25%20Replibit%20Backup%20Manager/README.md

Restart Required: No

Instructions:

1. Update Replibit Backup Manager to version 2017.08.04 or later. 2. Verify sudo configuration no longer allows vi execution with elevated privileges. 3. Test backup functionality after update.

🔧 Temporary Workarounds

Restrict sudo vi access

linux

Modify sudoers configuration to remove vi from allowed sudo commands for non-root users.

sudo visudo
Remove or comment out lines allowing vi execution with sudo

Implement least privilege sudo

linux

Review and restrict sudo permissions to only necessary commands for each user/group.

sudo visudo
Audit and modify sudoers file to follow least privilege principle

🧯 If You Can't Patch

  • Implement strict access controls and monitor sudo usage
  • Isolate vulnerable systems from critical network segments

🔍 How to Verify

Check if Vulnerable:

Check if sudo -l shows vi in allowed commands for non-root users and verify Replibit version is below 2017.08.04.

Check Version:

Check Replibit version through management interface or package manager

Verify Fix Applied:

Confirm sudo -l no longer shows vi in allowed commands and verify Replibit version is 2017.08.04 or higher.

📡 Detection & Monitoring

Log Indicators:

  • sudo vi execution in auth.log
  • Unexpected modifications to /etc/passwd
  • Unusual sudo command patterns

Network Indicators:

  • Unusual SSH or management connections to backup system

SIEM Query:

source="auth.log" AND "sudo" AND "vi"

🔗 References

📤 Share & Export