Cloud Defense Logo

Products

Solutions

Company

Book A Live Demo

CVE-2017-17659 : Exploit Details and Defense Strategies

Learn about CVE-2017-17659, a vulnerability in Quest NetVault Backup 11.3.0.12 allowing remote code execution. Find mitigation steps and affected systems here.

A vulnerability in Quest NetVault Backup 11.3.0.12 allows attackers to execute unauthorized code remotely without requiring authentication.

Understanding CVE-2017-17659

This CVE involves a flaw in how NVBUJobHistory Get method requests are handled, enabling attackers to execute code within the database.

What is CVE-2017-17659?

The vulnerability in Quest NetVault Backup 11.3.0.12 permits remote execution of unauthorized code due to improper input validation in SQL queries.

The Impact of CVE-2017-17659

        Attackers can exploit the vulnerability to execute code within the database without authentication.
        Identified as ZDI-CAN-4906.

Technical Details of CVE-2017-17659

The technical aspects of the vulnerability in Quest NetVault Backup 11.3.0.12.

Vulnerability Description

        Lack of proper validation of input strings in SQL queries.
        Allows remote code execution without authentication.

Affected Systems and Versions

        Product: Quest NetVault Backup
        Vendor: Quest
        Version: 11.3.0.12

Exploitation Mechanism

        Attackers exploit the NVBUJobHistory Get method requests to execute unauthorized code.

Mitigation and Prevention

Steps to address and prevent the CVE-2017-17659 vulnerability.

Immediate Steps to Take

        Apply vendor-supplied patches or updates promptly.
        Monitor for any unauthorized access or unusual database activity.

Long-Term Security Practices

        Regularly update and patch software to address vulnerabilities.
        Implement proper input validation mechanisms to prevent SQL injection attacks.

Patching and Updates

        Ensure all systems running Quest NetVault Backup are updated to a secure version.

Popular CVEs

CVE Id

Published Date

Is your System Free of Underlying Vulnerabilities?
Find Out Now