PT-2011-09: Arbitrary Command Execution in ManageEngine ServiceDesk Plus 8.0.0

Vulnerable software

ManageEngine ServiceDesk Plus
Version: 8.0 (8026) and earlier

Application link:
http://www.servicedeskplus.com

Severity level

Severity level: High
Impact: Arbitrary Code Execution
Access Vector: Network exploitable 

CVSS v2:
Base Score: 8.5
Vector: (AV:N/AC:M/Au:S/C:C/I:C/A:C)

CVE: not assigned

Software description

ManageEngine ServiceDesk Plus is a technical support and assests management system.

Vulnerability description

The specialists of the Positive Research center have revealed an arbitrary code execution vulnerability in ManageEngine ServiceDesk Plus.

If Microsoft SQL Server is used as application database server, insufficient validation of input settings for /CustomReporthandler.do script that is use to generate custom reports allows users with privileges to generate reports to execute arbitrary SQL requests in SELECT statement.

If an account used to log in, has privileges to execute xp_cmdshell stored procedure, the vulnerability allows attackers to execute arbitrary commands.

Also, if MySQL is used as a database server, incorrect input validation allows attackers to read and write arbitrary files on the server.

How to fix

Update your software up to the latest version

Advisory status

24.06.2011 - Vendor is notified
28.06.2011 - Vendor gets vulnerability details
29.03.2012 - Vendor releases fixed version and details
23.04.2012 - Public disclosure

Credits

The vulnerability was discovered by Alexander Zaitsev, Positive Research Center (Positive Technologies Company)

References

http://en.securitylab.ru/lab/PT-2011-09

Reports on the vulnerabilities previously discovered by Positive Research:

http://ptsecurity.com/research/advisory/
http://en.securitylab.ru/lab/