SB2018032202 - Multiple vulnerabilities in ManageEngine products 



SB2018032202 - Multiple vulnerabilities in ManageEngine products

Published: March 22, 2018

Security Bulletin ID SB2018032202
Severity
High
Patch available
YES
Number of vulnerabilities 6
Exploitation vector Remote access
Highest impact Code execution

Breakdown by Severity

High 83% Low 17%
  • Low
  • Medium
  • High
  • Critical

Description

This security bulletin contains information about 6 secuirty vulnerabilities.


1) Remote code execution (CVE-ID: N/A)

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The weakness exists due to insufficient validation of user-supplied input. A remote attacker can send a specially configured zip-file, gain access to com.adventnet.sa.agent.UploadHandlerServlet through POST-request and execute arbitrary code with privileges of the EventLog user.

Successful exploitation of the vulnerability may result in system compromise.

2) Remote code execution (CVE-ID: N/A)

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The weakness exists due to insufficient validation of user-supplied input. A remote attacker can send specially crafted GET- or POST-request to /servlet/aam_servercmd, gain unauthorized access to com.adventnet.appmanager.servlets.comm.AAMRequestProcessor and execute arbitrary code with system privileges.

Successful exploitation of the vulnerability may result in system compromise.

3) Remote code execution (CVE-ID: N/A)

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The weakness exists due to insufficient validation of user-supplied input. A remote attacker can send specially crafted GET- or POST-request to /servlet/SyncEventServlet, gain access to SyncEventServlet and execute arbitrary code with system privileges.

Successful exploitation of the vulnerability may result in system compromise.

4) Remote code execution (CVE-ID: N/A)

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The weakness exists due to insufficient validation of user-supplied input. A remote attacker can send specially crafted GET- or POST-request, gain unauthorized access to MenuHandlerServlet and execute arbitrary code with system privileges.

Successful exploitation of the vulnerability may result in system compromise.

5) Remote code execution (CVE-ID: N/A)

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The weakness exists due to insufficient validation of user-supplied input. A remote attacker can send a specially crafted GET-request to /servlet/OPMRequestHandlerServlet, containing  «OPERATION_TYPE» parameter «APM_API_KEY_REQUEST» and a specially set parameter «USERNAME» and execute arbitrary code with system privileges.

Successful exploitation of the vulnerability may result in system compromise.

6) Information disclosure (CVE-ID: N/A)

The vulnerability allows a remote attacker to obtain potentially sensitive information on the target system.

The weakness exists due to insufficient validation of user-supplied input. A remote attacker can send a specially crafted POST-request to /servlet/OPMRequestHandlerServlet, gain unauthorized access to FailOverHelperServlet  and obtain arbitrary data.

Remediation

Install update from vendor's website.