CVE-2017-17418
📋 TL;DR
CVE-2017-17418 is a critical SQL injection vulnerability in Quest NetVault Backup that allows unauthenticated remote attackers to execute arbitrary SQL commands. This can lead to remote code execution on the underlying database server. All installations of NetVault Backup 11.3.0.12 are affected.
💻 Affected Systems
- Quest NetVault Backup
📦 What is this software?
⚠️ Risk & Real-World Impact
Worst Case
Complete compromise of the database server leading to data theft, ransomware deployment, and lateral movement to other systems in the network.
Likely Case
Database compromise leading to backup data theft, credential harvesting, and potential privilege escalation to operating system level.
If Mitigated
Limited impact with proper network segmentation and database hardening, potentially only affecting the backup application's functionality.
🎯 Exploit Status
ZDI published detailed advisory with exploitation details. The vulnerability is in the NVBUPolicy Get method and requires minimal technical skill to exploit.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: 11.3.0.13 or later
Vendor Advisory: https://support.quest.com/netvault-backup/kb/293038/quest-netvault-backup-security-vulnerabilities-november-2017
Restart Required: Yes
Instructions:
1. Download the latest version from Quest support portal. 2. Backup current configuration. 3. Stop NetVault Backup services. 4. Install the update. 5. Restart services and verify functionality.
🔧 Temporary Workarounds
Network Access Control
allRestrict access to NetVault Backup web interface to trusted IP addresses only
# Use firewall rules to restrict access to port 8000/TCP (default)
iptables -A INPUT -p tcp --dport 8000 -s trusted_ip_range -j ACCEPT
iptables -A INPUT -p tcp --dport 8000 -j DROP
Web Application Firewall
allDeploy WAF with SQL injection protection rules
# Example ModSecurity rule
SecRule ARGS "@detectSQLi" "id:1000,phase:2,deny,status:403,msg:'SQL Injection Attempt'"
🧯 If You Can't Patch
- Immediately isolate the NetVault Backup server from internet and restrict network access to only necessary administrative systems
- Implement database hardening: use least privilege accounts, enable SQL injection protection features, and monitor for suspicious database queries
🔍 How to Verify
Check if Vulnerable:
Check NetVault Backup version in web interface or installation directory. Version 11.3.0.12 is vulnerable.
Check Version:
On Windows: Check Help > About in NetVault GUI. On Linux: Check /usr/local/quest/netvault/version.txt
Verify Fix Applied:
Verify version is 11.3.0.13 or later. Test SQL injection attempts should be blocked or logged.
📡 Detection & Monitoring
Log Indicators:
- Unusual SQL queries in database logs
- Multiple failed login attempts followed by NVBUPolicy requests
- Unexpected process creation from database service
Network Indicators:
- SQL injection patterns in HTTP requests to /nwapi/NVBUPolicy
- Unusual outbound connections from database server
- High volume of requests to vulnerable endpoint
SIEM Query:
source="netvault_logs" AND ("NVBUPolicy" AND ("UNION" OR "SELECT" OR "INSERT" OR "DELETE" OR "--" OR "' OR '1'='1"))