Lucene search

K
saintSAINT CorporationSAINT:27C5127555C4E549C099885D4DCD41D9
HistoryFeb 17, 2023 - 12:00 a.m.

Zoho ManageEngine ServiceDesk Plus SAMLResponse command execution

2023-02-1700:00:00
SAINT Corporation
download.saintcorporation.com
164
zoho manageengine servicedesk plus
samlresponse
command execution
vulnerability
apache santuario library
remote attack
unauthenticated
upgrade
cve-2022-47966
saml-based sso
windows

CVSS3

9.8

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

EPSS

0.975

Percentile

100.0%

Added: 02/17/2023

Background

Zoho ManageEngine ServiceDesk Plus is IT helpdesk software.

Problem

A vulnerability in an outdated Apache Santuario library in ServiceDesk Plus allows a remote, unauthenticated attacker to execute arbitrary commands by sending a specially crafted **SAMLResponse** parameter to the SAML endpoint.

Resolution

Upgrade to ServiceDesk Plus 14004 or higher.

References

<https://www.manageengine.com/security/advisory/CVE/cve-2022-47966.html&gt;
<https://www.horizon3.ai/manageengine-cve-2022-47966-technical-deep-dive/&gt;

Limitations

The target must have been configured with SAML-based SSO at least once in the past in order to be exploitable.

Platforms

Windows

CVSS3

9.8

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

EPSS

0.975

Percentile

100.0%