SB2019042312 - Multiple vulnerabilities in Zoho ManageEngine Applications Manager
Published: April 23, 2019 Updated: October 16, 2019
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 2 secuirty vulnerabilities.
1) SQL injection (CVE-ID: CVE-2019-11448)
The vulnerability allows a remote attacker to execute arbitrary SQL queries in database.
The vulnerability exists due to insufficient sanitization of user-supplied data passed via the "sid" parameter in "Popup_SLA.jsp". A remote attacker can gain the authority of SYSTEM on the server and execute arbitrary SQL commands within the application database.
Successful exploitation of this vulnerability may allow a remote attacker to read, delete, modify data in database and gain complete control over the affected application.
2) SQL injection (CVE-ID: CVE-2019-11469)
The vulnerability allows a remote attacker to execute arbitrary SQL queries in database.
The vulnerability exists due to insufficient sanitization of user-supplied data passed via the "resourceid" parameter in "/jsp/FaultTemplateOptions.jsp". A remote attacker can gain the authority of SYSTEM on the server by uploading a malicious file using the "Execute Program Action(s)" feature and execute arbitrary SQL commands within the application database.
Successful exploitation of this vulnerability may allow a remote attacker to read, delete, modify data in database and gain complete control over the affected application.
Remediation
Install update from vendor's website.
References
- https://pentest.com.tr/exploits/ManageEngine-App-Manager-14-SQLi-Remote-Code-Execution.html
- https://www.manageengine.com/products/applications_manager/security-updates/security-updates-cve-2019-11448.html
- https://pentest.com.tr/exploits/ManageEngine-App-Manager-14-Auth-Bypass-Remote-Command-Execution.html
- https://www.manageengine.com/products/applications_manager/security-updates/security-updates-cve-2019-11469.html