Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-783q-f465-8jv7

Опубликовано: 24 мая 2022
Источник: github
Github: Не прошло ревью

Описание

An issue was discovered in Zoho ManageEngine OpManager through 12.4x. One can bypass the user password requirement and execute commands on the server. The "username+'@opm' string is used for the password. For example, if the username is admin, the password is admin@opm.

An issue was discovered in Zoho ManageEngine OpManager through 12.4x. One can bypass the user password requirement and execute commands on the server. The "username+'@opm' string is used for the password. For example, if the username is admin, the password is admin@opm.

EPSS

Процентиль: 97%
0.3724
Средний

Связанные уязвимости

CVSS3: 9.8
nvd
больше 6 лет назад

An issue was discovered in Zoho ManageEngine OpManager in builds before 14310. One can bypass the user password requirement and execute commands on the server. The "username+'@opm' string is used for the password. For example, if the username is admin, the password is admin@opm.

EPSS

Процентиль: 97%
0.3724
Средний