#VU25643 Improper access control in Zoho ManageEngine EventLog Analyzer


Vulnerability identifier: #VU25643

Vulnerability risk: Low

CVSSv3.1: 3.9 [CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N/E:P/RL:O/RC:C]

CVE-ID: CVE-2019-19774

CWE-ID: CWE-284

Exploitation vector: Network

Exploit availability: Yes

Vulnerable software:
Zoho ManageEngine EventLog Analyzer
Server applications / IDS/IPS systems, Firewalls and proxy servers

Vendor: Zoho Corporation

Description

The vulnerability allows a remote attacker to gain unauthorized access to otherwise restricted functionality.

The vulnerability exists due to improper access restrictions. A remote attacker can bypass implemented security restrictions by running "select hostdetails from hostdetails" at the /event/runquery.do endpoint and recover the MD5 hashes of the accounts used to authenticate the ManageEngine platform to the managed machines on the network (most often administrative accounts).

Mitigation
Install updates from vendor's website.

Vulnerable software versions

Zoho ManageEngine EventLog Analyzer: 9000 - 12100


External links
http://packetstormsecurity.com/files/156485/ManageEngine-EventLog-Analyzer-10.0-Information-Disclosure.html
http://gist.github.com/scottgoodwin90/19ccecdc9f5733c0a9381765cfc7fe39
http://www.manageengine.com/products/eventlog/features-new.html#release


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote authenticated user via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability. However, proof of concept for this vulnerability is available.


Latest bulletins with this vulnerability