PT-2011-09: Arbitrary Command Execution in ManageEngine ServiceDesk Plus 8.0.0
Vulnerable software
ManageEngine ServiceDesk Plus
Version: 8.0 (8026) and earlier
Application link:
http://www.servicedeskplus.com
Severity level
Severity level: High
Impact: Arbitrary Code Execution
Access Vector: Network exploitable
CVSS v2:
Base Score: 8.5
Vector: (AV:N/AC:M/Au:S/C:C/I:C/A:C)
CVE: not assigned
Software description
ManageEngine ServiceDesk Plus is a technical support and assests management system.
Vulnerability description
The specialists of the Positive Research center have revealed an arbitrary code execution vulnerability in ManageEngine ServiceDesk Plus.
If Microsoft SQL Server is used as application database server, insufficient validation of input settings for /CustomReporthandler.do script that is use to generate custom reports allows users with privileges to generate reports to execute arbitrary SQL requests in SELECT statement.
If an account used to log in, has privileges to execute xp_cmdshell stored procedure, the vulnerability allows attackers to execute arbitrary commands.
Also, if MySQL is used as a database server, incorrect input validation allows attackers to read and write arbitrary files on the server.
How to fix
Update your software up to the latest version
Advisory status
24.06.2011 - Vendor is notified
28.06.2011 - Vendor gets vulnerability details
29.03.2012 - Vendor releases fixed version and details
23.04.2012 - Public disclosure
Credits
The vulnerability was discovered by Alexander Zaitsev, Positive Research Center (Positive Technologies Company)
References
http://en.securitylab.ru/lab/PT-2011-09
Reports on the vulnerabilities previously discovered by Positive Research:
http://ptsecurity.com/research/advisory/
http://en.securitylab.ru/lab/