A remote code execution issue was discovered in Zoho ManageEngine Applications Manager before 13.6 (build 13640). The publicly accessible testCredential.do endpoint takes multiple user inputs and validates supplied credentials by accessing a specified system. This endpoint calls several internal classes, and then executes a PowerShell script. If the specified system is OfficeSharePointServer, then the username and password parameters to this script are not validated, leading to Command Injection.
References
Link | Resource |
---|---|
https://pentest.blog/advisory-manageengine-applications-manager-remote-code-execution-sqli-and/ | Exploit Technical Description Third Party Advisory |
https://github.com/rapid7/metasploit-framework/pull/9684 | Exploit Third Party Advisory |
http://www.securityfocus.com/bid/103358 | Third Party Advisory VDB Entry |
https://www.exploit-db.com/exploits/44274/ | Exploit Third Party Advisory VDB Entry |
https://pitstop.manageengine.com/portal/community/topic/security-vulnerability-issues-fixed-upgrade-to-the-latest-version-of-applications-manager | Third Party Advisory |
https://www.manageengine.com/products/applications_manager/security-updates/security-updates-cve-2018-7890.html |
Configurations
Information
Published : 2018-03-08 14:29
Updated : 2019-10-02 17:03
NVD link : CVE-2018-7890
Mitre link : CVE-2018-7890
JSON object : View
CWE
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
Products Affected
zohocorp
- manageengine_applications_manager