HTTP: Quest NetVault Backup Multipart Request checksession Authentication Bypass

This signature attempts to detect an authentication bypass vulnerability which has been reported in the web interface component of Quest NetVault Backup. A remote, unauthenticated attacker could exploit this vulnerability by sending a maliciously crafted request to the target server. Successful exploitation allows for bypass of the authentication mechanism and, in conjunction with other vulnerabilities, allows for the execution of arbitrary code as the SYSTEM user.

Extended Description

This vulnerability allows remote attackers to bypass authentication on vulnerable installations of Quest NetVault Backup 11.2.0.13. The specific flaw exists within JSON RPC Request handling. By setting the checksession parameter to a specific value, it is possible to bypass authentication to critical functions. An attacker can leverage this in conjunction with other vulnerabilities to execute arbitrary code in the context of SYSTEM. Was ZDI-CAN-4752.

Affected Products

Quest netvault_backup

References

CVE: CVE-2018-1162

Short Name
HTTP:NETVAULT-AUTH-BYPSS
Severity
Major
Recommended
True
Recommended Action
Drop
Category
HTTP
Keywords
Authentication Backup Bypass CVE-2018-1162 CVE-2018-1163 Multipart NetVault Quest Request checksession
Release Date
02/22/2018
Supported Platforms

srx-branch-12.3

srx-19.3

srx-branch-19.3

vsrx3bsd-19.2

srx-branch-19.4

vsrx-19.4

mx-12.3

mx-19.4

vmx-19.4

mx-19.3

vsrx3bsd-19.4

srx-19.4

vsrx-12.3

vmx-19.3

vsrx-19.2

srx-12.3

Sigpack Version
3399
False Positive
Unknown
Vendors

Quest

CVSS Score

8.5

10.0

Found a potential security threat?