Default installations of Zoho ManageEngine ServiceDesk Plus 10.0 before 10500 are vulnerable to XSS injected by a workstation local administrator. Using the installed program names of the computer as a vector, the local administrator can execute code on the Manage Engine ServiceDesk administrator side. At "Asset Home > Server > <workstation> > software" the administrator of ManageEngine can control what software is installed on the workstation. This table shows all the installed program names in the Software column. In this field, a remote attacker can inject malicious code in order to execute it when the ManageEngine administrator visualizes this page.
References
Link | Resource |
---|---|
https://www.manageengine.com/products/service-desk/readme.html | Release Notes Vendor Advisory |
https://www.manageengine.com/products/service-desk/on-premises/readme.html#readme105 | Release Notes Vendor Advisory |
http://packetstormsecurity.com/files/157717/ManageEngine-Service-Desk-10.0-Cross-Site-Scripting.html | Third Party Advisory |
https://www.exploit-db.com/exploits/48473 | Third Party Advisory |
Configurations
Configuration 1 (hide)
|
Information
Published : 2020-05-14 07:15
Updated : 2020-05-19 09:33
NVD link : CVE-2019-15083
Mitre link : CVE-2019-15083
JSON object : View
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
Products Affected
zohocorp
- manageengine_servicedesk_plus