PT-2011-09: Arbitrary Command Execution in ManageEngine ServiceDesk Plus 8.0.0 Vulnerable software ManageEngine ServiceDesk Plus Version: 8.0 (8026) and earlier Application link: http://www.servicedeskplus.comSeverity levelSeverity level: High Impact: Arbitrary Code Execution Access Vector: Network exploitable CVSS v2: Base Score: 8.5 Vector: (AV:N/AC:M/Au:S/C:C/I:C/A:C)CVE: not assigned Software description ManageEngine ServiceDesk Plus is a technical support and assests management system. Vulnerability descriptionThe specialists of the Positive Research center have revealed an arbitrary code execution vulnerability in ManageEngine ServiceDesk Plus.If Microsoft SQL Server is used as application database server, insufficient validation of input settings for /CustomReporthandler.do script that is use to generate custom reports allows users with privileges to generate reports to execute arbitrary SQL requests in SELECT statement.If an account used to log in, has privileges to execute xp_cmdshell stored procedure, the vulnerability allows attackers to execute arbitrary commands.Also, if MySQL is used as a database server, incorrect input validation allows attackers to read and write arbitrary files on the server.How to fixUpdate your software up to the latest versionAdvisory status 24.06.2011 - Vendor is notified 28.06.2011 - Vendor gets vulnerability details 29.03.2012 - Vendor releases fixed version and details 23.04.2012 - Public disclosureCreditsThe vulnerability was discovered by Alexander Zaitsev, Positive Research Center (Positive Technologies Company)Referenceshttp://en.securitylab.ru/lab/PT-2011-09 Reports on the vulnerabilities previously discovered by Positive Research:http://ptsecurity.com/research/advisory/ http://en.securitylab.ru/lab/