ManageEngine ServiceDesk Plus MSP < 13.0 Build 13000 RCE

high Nessus Plugin ID 168355

Synopsis

The remote web server hosts an application that is affected by a remote code execution vulnerability.

Description

A remote code execution vulnerability exists in ManageEngine ServiceDesk Plus MSP prior to 13.0 Build 13000 due to a flaw in the Analytics Plus integration input field validation. Vulnerability requires an administrator role access. The option to integrate Zoho Analytics will no longer be available on ServiceDesk Plus MSP UI in build 13000.

Note that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number.

Solution

Upgrade to ManageEngine ServiceDesk Plus MSP version 13.0 Build 13000, or later.

See Also

http://www.nessus.org/u?888eb2db

http://www.nessus.org/u?68c25399

Plugin Details

Severity: High

ID: 168355

File Name: manageengine_servicedesk_msp_13000.nasl

Version: 1.3

Type: remote

Family: CGI abuses

Published: 12/2/2022

Updated: 3/16/2023

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 5.9

CVSS v2

Risk Factor: High

Base Score: 8.3

Temporal Score: 6.1

Vector: CVSS2#AV:N/AC:L/Au:M/C:C/I:C/A:C

CVSS Score Source: CVE-2022-40770

CVSS v3

Risk Factor: High

Base Score: 7.2

Temporal Score: 6.3

Vector: CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H

Temporal Vector: CVSS:3.0/E:U/RL:O/RC:C

Vulnerability Information

CPE: cpe:/a:zohocorp:manageengine_servicedesk_plus_msp

Required KB Items: installed_sw/manageengine_servicedesk

Exploit Ease: No known exploits are available

Patch Publication Date: 10/13/2022

Vulnerability Publication Date: 11/22/2022

Reference Information

CVE: CVE-2022-40770

IAVA: 2022-A-0497-S