CVE-2018-7890
Severity CVSS v4.0:
Pending analysis
Type:
CWE-78
OS Command Injections
Publication date:
08/03/2018
Last modified:
03/10/2019
Description
A remote code execution issue was discovered in Zoho ManageEngine Applications Manager before 13.6 (build 13640). The publicly accessible testCredential.do endpoint takes multiple user inputs and validates supplied credentials by accessing a specified system. This endpoint calls several internal classes, and then executes a PowerShell script. If the specified system is OfficeSharePointServer, then the username and password parameters to this script are not validated, leading to Command Injection.
Impact
Base Score 3.x
9.80
Severity 3.x
CRITICAL
Base Score 2.0
10.00
Severity 2.0
HIGH
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:a:zohocorp:manageengine_applications_manager:*:*:*:*:*:*:*:* | 13.6 (excluding) |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- http://www.securityfocus.com/bid/103358
- https://github.com/rapid7/metasploit-framework/pull/9684
- https://pentest.blog/advisory-manageengine-applications-manager-remote-code-execution-sqli-and/
- https://pitstop.manageengine.com/portal/community/topic/security-vulnerability-issues-fixed-upgrade-to-the-latest-version-of-applications-manager
- https://www.exploit-db.com/exploits/44274/
- https://www.manageengine.com/products/applications_manager/security-updates/security-updates-cve-2018-7890.html



