CVE-2019-12918

9.8 CRITICAL

📋 TL;DR

This vulnerability allows attackers to execute arbitrary SQL commands on Quest KACE Systems Management Appliance Server Center through SQL injection in the software_library.php file. Organizations using version 9.1.317 of this appliance are affected, potentially exposing sensitive system data and allowing unauthorized access.

💻 Affected Systems

Products:
  • Quest KACE Systems Management Appliance Server Center
Versions: 9.1.317
Operating Systems: Appliance OS
Default Config Vulnerable: ⚠️ Yes
Notes: The vulnerability exists in the default installation of the affected version.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete compromise of the KACE appliance database, allowing data exfiltration, privilege escalation, and potential lateral movement to connected systems.

🟠

Likely Case

Unauthorized access to sensitive system management data, configuration information, and potential credential harvesting from the database.

🟢

If Mitigated

Limited impact with proper network segmentation, database permissions, and input validation controls in place.

🌐 Internet-Facing: HIGH
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

SQL injection vulnerabilities typically have low exploitation complexity, though specific exploit details for this CVE are not publicly documented.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Versions after 9.1.317

Vendor Advisory: https://support.quest.com/kb/311388/quest-response-to-certezza-vulnerability-report

Restart Required: Yes

Instructions:

1. Log into the KACE appliance admin interface. 2. Navigate to System > Updates. 3. Apply the latest available update from Quest. 4. Restart the appliance as prompted.

🔧 Temporary Workarounds

Input Validation Filter

all

Implement web application firewall rules or input validation to filter SQL injection patterns in order[0][column] and order[0][dir] parameters.

Network Segmentation

all

Restrict network access to the KACE appliance management interface to authorized administrative networks only.

🧯 If You Can't Patch

  • Implement strict network access controls to limit who can reach the KACE appliance management interface.
  • Deploy a web application firewall with SQL injection detection rules in front of the appliance.

🔍 How to Verify

Check if Vulnerable:

Check the appliance version in the admin interface under Help > About. If version is 9.1.317, the system is vulnerable.

Check Version:

Not applicable - check via web interface at /adminui/login.php

Verify Fix Applied:

After updating, verify the version is no longer 9.1.317 and test the software_library.php endpoint with SQL injection test payloads.

📡 Detection & Monitoring

Log Indicators:

  • Unusual SQL queries in database logs
  • Multiple failed login attempts followed by SQL error messages
  • Requests to software_library.php with unusual parameter values

Network Indicators:

  • HTTP POST requests to software_library.php containing SQL keywords in parameters
  • Unusual database connection patterns from the web server

SIEM Query:

source="web_logs" AND uri="/software_library.php" AND (param="order[0][column]" OR param="order[0][dir]") AND (value CONTAINS "UNION" OR value CONTAINS "SELECT" OR value CONTAINS "OR 1=1")

🔗 References

📤 Share & Export