CVE-2018-1000044

9.8 CRITICAL

📋 TL;DR

This vulnerability allows attackers to execute arbitrary SQL commands via the sensors parameter in the .inc/callback.php file of Squert. It affects Security Onion Solutions Squert versions 1.1.1 through 1.6.7, potentially compromising the entire database and system. Organizations using vulnerable Squert installations for security monitoring are at risk.

💻 Affected Systems

Products:
  • Security Onion Solutions Squert
Versions: 1.1.1 through 1.6.7
Operating Systems: Linux (Security Onion distribution)
Default Config Vulnerable: ⚠️ Yes
Notes: Affects all installations of Squert within the specified version range. The vulnerability is in the core application code.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete database compromise leading to data exfiltration, privilege escalation, and potential remote code execution on the underlying server.

🟠

Likely Case

Unauthorized database access allowing attackers to read, modify, or delete security event data, potentially hiding malicious activity from detection.

🟢

If Mitigated

Limited impact with proper input validation and database permissions, potentially only allowing data viewing without modification.

🌐 Internet-Facing: HIGH - The vulnerability is exploitable via web requests, making internet-facing instances particularly vulnerable to automated attacks.
🏢 Internal Only: MEDIUM - Internal instances are still vulnerable to insider threats or attackers who gain internal network access.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

SQL injection vulnerabilities are commonly weaponized. The advisory provides technical details that could be used to create exploits.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 1.7.0

Vendor Advisory: http://blog.securityonion.net/2018/01/security-advisory-for-squert.html

Restart Required: Yes

Instructions:

1. Backup current Squert configuration and data. 2. Update Security Onion to latest version. 3. Verify Squert version is 1.7.0 or higher. 4. Restart Squert service: sudo so-squert-restart

🔧 Temporary Workarounds

Block access to vulnerable endpoint

linux

Temporarily block web access to .inc/callback.php file

sudo iptables -A INPUT -p tcp --dport 80 -m string --string ".inc/callback.php" --algo bm -j DROP
sudo iptables -A INPUT -p tcp --dport 443 -m string --string ".inc/callback.php" --algo bm -j DROP

Input validation via WAF

all

Configure web application firewall to block SQL injection patterns

# Configure ModSecurity or similar WAF with SQL injection rules
# Example ModSecurity rule: SecRule ARGS "@detectSQLi" "id:1000,phase:2,deny"

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate Squert from untrusted networks
  • Deploy additional monitoring and alerting for suspicious database queries

🔍 How to Verify

Check if Vulnerable:

Check Squert version: grep 'SQUERT_VERSION' /etc/squert/squert.conf or check web interface footer

Check Version:

grep SQUERT_VERSION /etc/squert/squert.conf || echo "Check web interface footer for version"

Verify Fix Applied:

Confirm version is 1.7.0 or higher and test callback.php endpoint with SQL injection payloads

📡 Detection & Monitoring

Log Indicators:

  • Unusual SQL queries in database logs
  • Multiple requests to .inc/callback.php with SQL-like parameters
  • Database error messages containing SQL syntax

Network Indicators:

  • HTTP requests to .inc/callback.php with SQL keywords in parameters
  • Unusual database connection patterns from web server

SIEM Query:

source="web_access.log" AND uri="/.inc/callback.php" AND (param="sensors" AND value CONTAINS "UNION" OR value CONTAINS "SELECT" OR value CONTAINS "INSERT")

🔗 References

📤 Share & Export