CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
AI Score
Confidence
Low
The version of ManageEngine ADAudit Plus installed on the remote host is prior to build 8000. It is, therefore, affected by multiple vulnerabilities.
Zohocorp ManageEngine ADAudit Plus versions below 8000 are vulnerable to the authenticated SQL injection in reports module. (CVE-2024-5556)
Zohocorp ManageEngine ADAudit Plus versions below 8000 are vulnerable to the authenticated SQL injection in aggregate reports option. (CVE-2024-5490)
Zohocorp ManageEngine ADAudit Plus versions below 8000 are vulnerable to the authenticated SQL injection in file summary option. (CVE-2024-36514)
Note that Nessus has not tested for these issues but has instead relied only on the application’s self-reported version number.
#%NASL_MIN_LEVEL 80900
##
# (C) Tenable, Inc.
##
include('compat.inc');
if (description)
{
script_id(206269);
script_version("1.3");
script_set_attribute(attribute:"plugin_modification_date", value:"2024/08/30");
script_cve_id(
"CVE-2024-36514",
"CVE-2024-36515",
"CVE-2024-36516",
"CVE-2024-36517",
"CVE-2024-5490",
"CVE-2024-5556"
);
script_xref(name:"IAVA", value:"2024-A-0523");
script_name(english:"ManageEngine ADAudit Plus < Build 8000 Multiple Vulnerabilities");
script_set_attribute(attribute:"synopsis", value:
"The remote host is missing one or more security updates.");
script_set_attribute(attribute:"description", value:
"The version of ManageEngine ADAudit Plus installed on the remote host is prior to build 8000. It is, therefore, affected by
multiple vulnerabilities.
- Zohocorp ManageEngine ADAudit Plus versions below 8000 are vulnerable to the authenticated SQL injection in
reports module. (CVE-2024-5556)
- Zohocorp ManageEngine ADAudit Plus versions below 8000 are vulnerable to the authenticated SQL injection in
aggregate reports option. (CVE-2024-5490)
- Zohocorp ManageEngine ADAudit Plus versions below 8000 are vulnerable to the authenticated SQL injection in
file summary option. (CVE-2024-36514)
Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version
number.");
# https://www.manageengine.com/products/active-directory-audit/cve-2024-36514.html
script_set_attribute(attribute:"see_also", value:"http://www.nessus.org/u?c56ad964");
# https://www.manageengine.com/products/active-directory-audit/cve-2024-36515.html
script_set_attribute(attribute:"see_also", value:"http://www.nessus.org/u?fbb71776");
# https://www.manageengine.com/products/active-directory-audit/cve-2024-36516.html
script_set_attribute(attribute:"see_also", value:"http://www.nessus.org/u?cd0e3d4b");
# https://www.manageengine.com/products/active-directory-audit/cve-2024-36517.html
script_set_attribute(attribute:"see_also", value:"http://www.nessus.org/u?9dd79b02");
# https://www.manageengine.com/products/active-directory-audit/cve-2024-5490.html
script_set_attribute(attribute:"see_also", value:"http://www.nessus.org/u?d9370b1e");
# https://www.manageengine.com/products/active-directory-audit/cve-2024-5556.html
script_set_attribute(attribute:"see_also", value:"http://www.nessus.org/u?fc7f1720");
script_set_attribute(attribute:"solution", value:
"Upgrade to ManageEngine ADAudit Plus build 8000 or later.");
script_set_attribute(attribute:"agent", value:"windows");
script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:S/C:C/I:C/A:C");
script_set_cvss_temporal_vector("CVSS2#E:U/RL:OF/RC:C");
script_set_cvss3_base_vector("CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H");
script_set_cvss3_temporal_vector("CVSS:3.0/E:U/RL:O/RC:C");
script_set_attribute(attribute:"cvss_score_source", value:"CVE-2024-5556");
script_set_attribute(attribute:"exploitability_ease", value:"No known exploits are available");
script_set_attribute(attribute:"exploit_available", value:"false");
script_set_attribute(attribute:"vuln_publication_date", value:"2024/03/01");
script_set_attribute(attribute:"patch_publication_date", value:"2024/03/01");
script_set_attribute(attribute:"plugin_publication_date", value:"2024/08/28");
script_set_attribute(attribute:"plugin_type", value:"combined");
script_set_attribute(attribute:"cpe", value:"cpe:/a:zohocorp:manageengine_adaudit_plus");
script_set_attribute(attribute:"stig_severity", value:"I");
script_end_attributes();
script_category(ACT_GATHER_INFO);
script_family(english:"Windows");
script_copyright(english:"This script is Copyright (C) 2024 and is owned by Tenable, Inc. or an Affiliate thereof.");
script_dependencies("manageengine_adaudit_plus_detect.nbin", "zoho_manageengine_adaudit_plus_win_installed.nbin");
script_require_ports("installed_sw/ManageEngine ADAudit Plus", "installed_sw/Zoho ManageEngine ADAudit Plus");
exit(0);
}
include('vcf.inc');
include('vcf_extras_zoho.inc');
var app_info = vcf::zoho::adaudit::get_app_info();
var constraints = [
{ 'fixed_version' : '8000' }
];
vcf::check_version_and_report(
app_info:app_info,
constraints:constraints,
severity:SECURITY_HOLE,
flags:{'sqli':TRUE}
);
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36514
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36515
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36516
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36517
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-5490
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-5556
www.nessus.org/u?9dd79b02
www.nessus.org/u?c56ad964
www.nessus.org/u?cd0e3d4b
www.nessus.org/u?d9370b1e
www.nessus.org/u?fbb71776
www.nessus.org/u?fc7f1720