CVE-2020-11531

The DataEngine Xnode Server application in Zoho ManageEngine DataSecurity Plus prior to 6.0.1 does not validate the database schema name when handling a DR-SCHEMA-SYNC request. This allows an authenticated attacker to execute code in the context of the product by writing a JSP file to the webroot directory via directory traversal.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:zohocorp:manageengine_adaudit_plus:*:*:*:*:*:*:*:*
cpe:2.3:a:zohocorp:manageengine_datasecurity_plus:*:*:*:*:*:*:*:*

History

21 Nov 2024, 04:58

Type Values Removed Values Added
References () http://packetstormsecurity.com/files/157604/ManageEngine-DataSecurity-Plus-Path-Traversal-Code-Execution.html - Exploit, Third Party Advisory, VDB Entry () http://packetstormsecurity.com/files/157604/ManageEngine-DataSecurity-Plus-Path-Traversal-Code-Execution.html - Exploit, Third Party Advisory, VDB Entry
References () http://seclists.org/fulldisclosure/2020/May/27 - Exploit, Mailing List, Third Party Advisory () http://seclists.org/fulldisclosure/2020/May/27 - Exploit, Mailing List, Third Party Advisory
References () https://pitstop.manageengine.com/portal/community/topic/upgrade-datasecurity-plus-to-the-build-6013-to-fix-security-issues - () https://pitstop.manageengine.com/portal/community/topic/upgrade-datasecurity-plus-to-the-build-6013-to-fix-security-issues -

Information

Published : 2020-05-08 21:15

Updated : 2024-11-21 04:58


NVD link : CVE-2020-11531

Mitre link : CVE-2020-11531

CVE.ORG link : CVE-2020-11531


JSON object : View

Products Affected

zohocorp

  • manageengine_adaudit_plus
  • manageengine_datasecurity_plus
CWE
CWE-22

Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')