A remote code execution issue was discovered in Zoho ManageEngine Applications Manager before 13.6 (build 13640). The publicly accessible testCredential.do endpoint takes multiple user inputs and validates supplied credentials by accessing a specified system. This endpoint calls several internal classes, and then executes a PowerShell script. If the specified system is OfficeSharePointServer, then the username and password parameters to this script are not validated, leading to Command Injection.
References
Configurations
History
21 Nov 2024, 04:12
Type | Values Removed | Values Added |
---|---|---|
References | () http://www.securityfocus.com/bid/103358 - Third Party Advisory, VDB Entry | |
References | () https://github.com/rapid7/metasploit-framework/pull/9684 - Exploit, Third Party Advisory | |
References | () https://pentest.blog/advisory-manageengine-applications-manager-remote-code-execution-sqli-and/ - Exploit, Technical Description, Third Party Advisory | |
References | () https://pitstop.manageengine.com/portal/community/topic/security-vulnerability-issues-fixed-upgrade-to-the-latest-version-of-applications-manager - Third Party Advisory | |
References | () https://www.exploit-db.com/exploits/44274/ - Exploit, Third Party Advisory, VDB Entry | |
References | () https://www.manageengine.com/products/applications_manager/security-updates/security-updates-cve-2018-7890.html - |
Information
Published : 2018-03-08 22:29
Updated : 2024-11-21 04:12
NVD link : CVE-2018-7890
Mitre link : CVE-2018-7890
CVE.ORG link : CVE-2018-7890
JSON object : View
Products Affected
zohocorp
- manageengine_applications_manager
CWE
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')