CVE-2017-17424
📋 TL;DR
CVE-2017-17424 is a critical SQL injection vulnerability in Quest NetVault Backup that allows unauthenticated remote attackers to execute arbitrary SQL commands. This can lead to remote code execution on the underlying database server. All users running vulnerable versions of NetVault Backup are affected.
💻 Affected Systems
- Quest NetVault Backup
📦 What is this software?
⚠️ Risk & Real-World Impact
Worst Case
Complete compromise of the database server leading to data theft, destruction, or ransomware deployment across the backup infrastructure.
Likely Case
Database compromise allowing data exfiltration, privilege escalation, and potential lateral movement to other systems.
If Mitigated
Limited impact with proper network segmentation and database hardening, though SQL injection would still succeed.
🎯 Exploit Status
ZDI published details and proof-of-concept. The vulnerability is straightforward to exploit due to lack of authentication requirements.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: 11.3.0.13 or later
Vendor Advisory: https://support.quest.com/netvault-backup/kb/293038/netvault-backup-security-vulnerability-notification
Restart Required: Yes
Instructions:
1. Download the latest patch from Quest support portal. 2. Backup current configuration. 3. Apply the patch following vendor instructions. 4. Restart NetVault Backup services. 5. Verify the update was successful.
🔧 Temporary Workarounds
Network Access Control
linuxRestrict access to NetVault Backup ports (typically TCP 20031-20034) to trusted IP addresses only.
Use firewall rules to limit access: iptables -A INPUT -p tcp --dport 20031:20034 -s trusted_ip -j ACCEPT
iptables -A INPUT -p tcp --dport 20031:20034 -j DROP
Network Access Control (Windows)
windowsRestrict access to NetVault Backup ports using Windows Firewall.
New-NetFirewallRule -DisplayName "Block NetVault Ports" -Direction Inbound -LocalPort 20031-20034 -Protocol TCP -Action Block
New-NetFirewallRule -DisplayName "Allow NetVault Ports" -Direction Inbound -LocalPort 20031-20034 -Protocol TCP -Action Allow -RemoteAddress trusted_ip
🧯 If You Can't Patch
- Immediately isolate the NetVault Backup server from untrusted networks using firewall rules.
- Implement web application firewall (WAF) rules to block SQL injection patterns targeting the NVBUScheduleSet endpoint.
🔍 How to Verify
Check if Vulnerable:
Check NetVault Backup version in the web interface or via the installed software list. Versions 11.3.0.12 and earlier are vulnerable.
Check Version:
On Windows: Check Add/Remove Programs. On Linux: rpm -qa | grep netvault or dpkg -l | grep netvault
Verify Fix Applied:
Verify the version is 11.3.0.13 or later. Test the NVBUScheduleSet endpoint with SQL injection payloads to confirm patching.
📡 Detection & Monitoring
Log Indicators:
- Unusual SQL queries in database logs
- Multiple failed authentication attempts followed by SQL errors
- Requests to /NVBUScheduleSet with SQL-like payloads
Network Indicators:
- Unusual traffic to NetVault Backup ports (20031-20034) from unexpected sources
- SQL error messages in HTTP responses
SIEM Query:
source="netvault.log" AND ("NVBUScheduleSet" AND ("SELECT", "UNION", "OR 1=1", "'--"))