SB2018032202 - Multiple vulnerabilities in ManageEngine products
Published: March 22, 2018
Security Bulletin ID
SB2018032202
Severity
High
Patch available
YES
Number of vulnerabilities
6
Exploitation vector
Remote access
Highest impact
Code execution
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 6 secuirty vulnerabilities.
1) Remote code execution (CVE-ID: N/A)
The vulnerability allows a remote attacker to execute arbitrary code on the target system.The weakness exists due to insufficient validation of user-supplied input. A remote attacker can send a specially configured zip-file, gain access to com.adventnet.sa.agent.UploadHandlerServlet through POST-request and execute arbitrary code with privileges of the EventLog user.
Successful exploitation of the vulnerability may result in system compromise.
2) Remote code execution (CVE-ID: N/A)
The vulnerability allows a remote attacker to execute arbitrary code on the target system.The weakness exists due to insufficient validation of user-supplied input. A remote attacker can send specially crafted GET- or POST-request to /servlet/aam_servercmd, gain unauthorized access to com.adventnet.appmanager.servlets.comm.AAMRequestProcessor and execute arbitrary code with system privileges.
Successful exploitation of the vulnerability may result in system compromise.
3) Remote code execution (CVE-ID: N/A)
The vulnerability allows a remote attacker to execute arbitrary code on the target system.The weakness exists due to insufficient validation of user-supplied input. A remote attacker can send specially crafted GET- or POST-request to /servlet/SyncEventServlet, gain access to SyncEventServlet and execute arbitrary code with system privileges.
Successful exploitation of the vulnerability may result in system compromise.
4) Remote code execution (CVE-ID: N/A)
The vulnerability allows a remote attacker to execute arbitrary code on the target system.The weakness exists due to insufficient validation of user-supplied input. A remote attacker can send specially crafted GET- or POST-request, gain unauthorized access to MenuHandlerServlet and execute arbitrary code with system privileges.
Successful exploitation of the vulnerability may result in system compromise.
5) Remote code execution (CVE-ID: N/A)
The vulnerability allows a remote attacker to execute arbitrary code on the target system.The weakness exists due to insufficient validation of user-supplied input. A remote attacker can send a specially crafted GET-request to /servlet/OPMRequestHandlerServlet, containing «OPERATION_TYPE» parameter «APM_API_KEY_REQUEST» and a specially set parameter «USERNAME» and execute arbitrary code with system privileges.
Successful exploitation of the vulnerability may result in system compromise.
6) Information disclosure (CVE-ID: N/A)
The vulnerability allows a remote attacker to obtain potentially sensitive information on the target system.The weakness exists due to insufficient validation of user-supplied input. A remote attacker can send a specially crafted POST-request to /servlet/OPMRequestHandlerServlet, gain unauthorized access to FailOverHelperServlet and obtain arbitrary data.
Remediation
Install update from vendor's website.