A CSV injection vulnerability on the login panel of ManageEngine ADSelfService Plus Version: 6.1 Build No: 6101 can be exploited by an unauthenticated user. The j_username parameter seems to be vulnerable and a reverse shell could be obtained if a privileged user exports "User Attempts Audit Report" as CSV file. Note: The vendor disputes this vulnerability, claiming "This is not a valid vulnerability in our ADSSP product. We don't see this as a security issue at our side.
References
Link | Resource |
---|---|
https://docs.unsafe-inline.com/0day/manageengine-adselfservice-plus-6.1-csv-injection | Exploit Third Party Advisory |
Configurations
History
07 Nov 2023, 03:35
Type | Values Removed | Values Added |
---|---|---|
Summary | A CSV injection vulnerability on the login panel of ManageEngine ADSelfService Plus Version: 6.1 Build No: 6101 can be exploited by an unauthenticated user. The j_username parameter seems to be vulnerable and a reverse shell could be obtained if a privileged user exports "User Attempts Audit Report" as CSV file. Note: The vendor disputes this vulnerability, claiming "This is not a valid vulnerability in our ADSSP product. We don't see this as a security issue at our side. |
Information
Published : 2021-08-09 14:15
Updated : 2024-08-04 00:15
NVD link : CVE-2021-33256
Mitre link : CVE-2021-33256
CVE.ORG link : CVE-2021-33256
JSON object : View
Products Affected
zohocorp
- manageengine_adselfservice_plus
CWE
CWE-1236
Improper Neutralization of Formula Elements in a CSV File