Lucene search

K
zdiHir0otZDI-23-1719
HistoryNov 22, 2023 - 12:00 a.m.

ManageEngine Recovery Manager Plus getEscapedValue Command Injection Remote Code Execution Vulnerability

2023-11-2200:00:00
hir0ot
www.zerodayinitiative.com
9
manageengine
recovery manager plus
remote code execution
authentication
getescapedvalue method
system call
service account

AI Score

7.7

Confidence

High

EPSS

0.006

Percentile

78.3%

This vulnerability allows remote attackers to execute arbitrary code on affected installations of ManageEngine Recovery Manager Plus. Authentication is required to exploit this vulnerability. The specific flaw exists within the getEscapedValue method. The issue results from the lack of proper validation of a user-supplied string before using it to execute a system call. An attacker can leverage this vulnerability to execute code in the context of the service account.

AI Score

7.7

Confidence

High

EPSS

0.006

Percentile

78.3%

Related for ZDI-23-1719