The DataEngine Xnode Server application in Zoho ManageEngine DataSecurity Plus prior to 6.0.1 does not validate the database schema name when handling a DR-SCHEMA-SYNC request. This allows an authenticated attacker to execute code in the context of the product by writing a JSP file to the webroot directory via directory traversal.
References
Link | Resource |
---|---|
http://seclists.org/fulldisclosure/2020/May/27 | Exploit Mailing List Third Party Advisory |
http://packetstormsecurity.com/files/157604/ManageEngine-DataSecurity-Plus-Path-Traversal-Code-Execution.html | Exploit Third Party Advisory VDB Entry |
https://pitstop.manageengine.com/portal/community/topic/upgrade-datasecurity-plus-to-the-build-6013-to-fix-security-issues |
Configurations
Configuration 1 (hide)
|
Information
Published : 2020-05-08 14:15
Updated : 2020-05-18 05:15
NVD link : CVE-2020-11531
Mitre link : CVE-2020-11531
JSON object : View
CWE
CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
Products Affected
zohocorp
- manageengine_datasecurity_plus
- manageengine_adaudit_plus