CVE-2017-14476
📋 TL;DR
This vulnerability allows remote command injection in MySQL Multi-Master Replication Manager (MMM) agent daemon. Attackers can execute arbitrary commands with mmm_agentd process privileges by sending specially crafted TCP messages. Systems running vulnerable MMM versions with mmm_agentd exposed are affected.
💻 Affected Systems
- MySQL Multi-Master Replication Manager (MMM)
📦 What is this software?
⚠️ Risk & Real-World Impact
Worst Case
Complete system compromise leading to data theft, lateral movement, and persistent backdoor installation.
Likely Case
Unauthorized command execution allowing privilege escalation, data access, and service disruption.
If Mitigated
Limited impact if network segmentation prevents access to mmm_agentd port.
🎯 Exploit Status
Exploit requires network access to mmm_agentd port (default 9988).
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: 2.2.2 or later
Vendor Advisory: https://github.com/mysql-mmm/mysql-mmm
Restart Required: Yes
Instructions:
1. Stop mmm_agentd service. 2. Update MMM to version 2.2.2+. 3. Restart mmm_agentd service.
🔧 Temporary Workarounds
Network Segmentation
linuxRestrict access to mmm_agentd port (default 9988) using firewall rules.
iptables -A INPUT -p tcp --dport 9988 -j DROP
firewall-cmd --permanent --add-rich-rule='rule family="ipv4" source address="TRUSTED_IP" port protocol="tcp" port="9988" accept'
🧯 If You Can't Patch
- Implement strict network ACLs to limit access to mmm_agentd port to trusted hosts only.
- Monitor network traffic to mmm_agentd port for suspicious activity.
🔍 How to Verify
Check if Vulnerable:
Check MMM version: mmm --version or check package manager. If version is 2.2.1 or earlier, system is vulnerable.
Check Version:
mmm --version 2>/dev/null || rpm -qa | grep -i mmm || dpkg -l | grep -i mmm
Verify Fix Applied:
Verify MMM version is 2.2.2 or later and test that mmm_agentd service is running without errors.
📡 Detection & Monitoring
Log Indicators:
- Unusual commands in mmm_agentd logs
- Failed authentication attempts to mmm_agentd
Network Indicators:
- Unexpected TCP connections to port 9988
- Suspicious payloads in network traffic to mmm_agentd
SIEM Query:
source="mmm_agentd.log" AND (command="*;*" OR command="*|*" OR command="*`*" OR command="*$(*")