Zoho ManageEngine DataSecurity Plus prior to 6.0.1 uses default admin credentials to communicate with a DataEngine Xnode server. This allows an attacker to bypass authentication for this server and execute all operations in the context of admin user.
References
Link | Resource |
---|---|
http://packetstormsecurity.com/files/157609/ManageEngine-DataSecurity-Plus-Authentication-Bypass.html | Exploit Third Party Advisory VDB Entry |
http://seclists.org/fulldisclosure/2020/May/28 | Exploit Mailing List Third Party Advisory |
https://pitstop.manageengine.com/portal/community/topic/upgrade-datasecurity-plus-to-the-build-6013-to-fix-security-issues | Patch Vendor Advisory |
http://packetstormsecurity.com/files/157609/ManageEngine-DataSecurity-Plus-Authentication-Bypass.html | Exploit Third Party Advisory VDB Entry |
http://seclists.org/fulldisclosure/2020/May/28 | Exploit Mailing List Third Party Advisory |
https://pitstop.manageengine.com/portal/community/topic/upgrade-datasecurity-plus-to-the-build-6013-to-fix-security-issues | Patch Vendor Advisory |
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 04:58
Type | Values Removed | Values Added |
---|---|---|
References | () http://packetstormsecurity.com/files/157609/ManageEngine-DataSecurity-Plus-Authentication-Bypass.html - Exploit, Third Party Advisory, VDB Entry | |
References | () http://seclists.org/fulldisclosure/2020/May/28 - Exploit, Mailing List, Third Party Advisory | |
References | () https://pitstop.manageengine.com/portal/community/topic/upgrade-datasecurity-plus-to-the-build-6013-to-fix-security-issues - Patch, Vendor Advisory |
Information
Published : 2020-05-08 21:15
Updated : 2024-11-21 04:58
NVD link : CVE-2020-11532
Mitre link : CVE-2020-11532
CVE.ORG link : CVE-2020-11532
JSON object : View
Products Affected
zohocorp
- manageengine_adaudit_plus
- manageengine_datasecurity_plus
CWE
CWE-1188
Insecure Default Initialization of Resource