Описание
An issue was discovered in Zoho ManageEngine OpManager in builds before 14310. One can bypass the user password requirement and execute commands on the server. The "username+'@opm' string is used for the password. For example, if the username is admin, the password is admin@opm.
Ссылки
- ExploitThird Party Advisory
- ExploitThird Party AdvisoryVDB Entry
- ExploitThird Party Advisory
- ExploitThird Party AdvisoryVDB Entry
Уязвимые конфигурации
Конфигурация 1Версия до 12.4.034 (включая)
cpe:2.3:a:zohocorp:manageengine_opmanager:*:*:*:*:*:*:*:*
EPSS
Процентиль: 97%
0.3724
Средний
9.8 Critical
CVSS3
7.5 High
CVSS2
Дефекты
CWE-306
Связанные уязвимости
github
больше 3 лет назад
An issue was discovered in Zoho ManageEngine OpManager through 12.4x. One can bypass the user password requirement and execute commands on the server. The "username+'@opm' string is used for the password. For example, if the username is admin, the password is admin@opm.
EPSS
Процентиль: 97%
0.3724
Средний
9.8 Critical
CVSS3
7.5 High
CVSS2
Дефекты
CWE-306