10
CVSSv2

CVE-2017-18044

Published: 19/01/2018 Updated: 03/10/2019
CVSS v2 Base Score: 10 | Impact Score: 10 | Exploitability Score: 10
CVSS v3 Base Score: 9.8 | Impact Score: 5.9 | Exploitability Score: 3.9
VMScore: 890
Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C

Vulnerability Summary

A Command Injection issue exists in ContentStore/Base/CVDataPipe.dll in Commvault before v11 SP6. A certain message parsing function inside the Commvault service does not properly validate the input of an incoming string before passing it to CreateProcess. As a result, a specially crafted message can inject commands that will be executed on the target operating system. Exploitation of this vulnerability does not require authentication and can lead to SYSTEM level privilege on any system running the cvd daemon. This is a different vulnerability than CVE-2017-3195.

Vulnerable Product Search on Vulmon Subscribe to Product

commvault commvault 11.0

commvault commvault

Github Repositories

Commvault-CVE-2017-18044

CVE-2017-18044 Native POC This is a dead simple POC for the CVE-2017-18044 command injection vulnerability in Commvault v11 SP5 and older For metasploit users, a ruby version of the exploit is also bundled with the lastest build wwwrapid7com/db/modules/exploit/windows/misc/commvault_cmd_exec Usage: comvlt -h Usage -i IP Address of host (Default: 127001