Quest netvault backup server < 11.4.5 process manager service sql injection / remote code execution Vulnerability / Exploit
/
/
/
Exploits / Vulnerability Discovered : 2019-02-22 |
Type : webapps |
Platform : multiple
This exploit / vulnerability Quest netvault backup server < 11.4.5 process manager service sql injection / remote code execution is for educational purposes only and if it is used you will do on your own risk!
[+] Code ...
# Exploit Title: Quest NetVault Backup Server < 11.4.5 Process Manager Service SQL Injection Remote Code Execution Vulnerability (ZDI-17-982)
# Date: 2-21-2019
# Exploit Author: credit goes to rgod for finding the bug
# Version: Quest NetVault Backup Server < 11.4.5
# CVE : CVE-2017-17417
# There is a decent description of the bug here: https://www.zerodayinitiative.com/advisories/ZDI-17-982/
# but no PoC, hence this submission. Also the description states that authentication is not required.
# I did not find the auth bypass, but the target was using default credz
# of admin and a blank password.
#
# "This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations
# of Quest NetVault Backup. Authentication is not required to exploit this vulnerability.
#
# The specific flaw exists within the handling of NVBUPhaseStatus Acknowledge method requests.
# The issue results from the lack of proper validation of a
# user-supplied string before using it to construct SQL queries. An attacker can leverage this
# vulnerability to execute code in the context of the underlying database."
# Fill out the variables then copy paste everything below this line into a kali terminal