CVE-2018-11136

9.8 CRITICAL

📋 TL;DR

This vulnerability allows attackers to execute arbitrary SQL commands through the unsanitized 'orgID' parameter in Quest KACE System Management Appliance. Successful exploitation could lead to data theft, system compromise, or denial of service. Organizations using Quest KACE System Management Appliance 8.0.318 are affected.

💻 Affected Systems

Products:
  • Quest KACE System Management Appliance
Versions: 8.0.318
Operating Systems: Linux-based appliance OS
Default Config Vulnerable: ⚠️ Yes
Notes: The vulnerable script is part of the default web interface installation.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete compromise of the KACE appliance, data exfiltration of all managed systems, and lateral movement to connected networks.

🟠

Likely Case

Database information disclosure, privilege escalation, and potential control over managed endpoints.

🟢

If Mitigated

Limited impact with proper network segmentation and database permissions, though SQL injection remains possible.

🌐 Internet-Facing: HIGH - The vulnerable endpoint is accessible via web interface and can be exploited remotely.
🏢 Internal Only: HIGH - Even internally, this provides a foothold for lateral movement within the network.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Time-based blind SQL injection requires authentication but is well-documented in security advisories.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 8.0.319 or later

Vendor Advisory: https://support.quest.com/kace-systems-management-appliance/kb/335982/quest-response-to-cve-2018-11136-sql-injection-vulnerability-in-kace-sma

Restart Required: Yes

Instructions:

1. Backup current configuration. 2. Download latest patch from Quest support portal. 3. Apply patch via KACE admin interface. 4. Restart appliance services.

🔧 Temporary Workarounds

Web Application Firewall

all

Deploy WAF with SQL injection rules to block malicious requests.

Access Restriction

linux

Restrict access to /common/download_agent_installer.php endpoint via network controls.

iptables -A INPUT -p tcp --dport 443 -m string --string "/common/download_agent_installer.php" --algo bm -j DROP

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate KACE appliance from critical systems.
  • Enable detailed SQL query logging and monitor for unusual database activity patterns.

🔍 How to Verify

Check if Vulnerable:

Check if version is 8.0.318 via KACE admin interface or by examining /etc/issue file on appliance.

Check Version:

cat /etc/issue | grep KACE

Verify Fix Applied:

Confirm version is 8.0.319 or higher and test SQL injection payloads return proper error handling.

📡 Detection & Monitoring

Log Indicators:

  • Unusual SQL queries in database logs
  • Multiple failed authentication attempts followed by SQL error patterns

Network Indicators:

  • HTTP POST requests to /common/download_agent_installer.php with SQL syntax in parameters
  • Unusual outbound database connections

SIEM Query:

source="web_logs" AND url="/common/download_agent_installer.php" AND (param="orgID" AND value MATCHES "(?i)(SELECT|UNION|INSERT|DELETE|UPDATE|DROP|OR|AND)")

🔗 References

📤 Share & Export