ManageEngine ADSelfService Plus resetUnLock Authentication Bypass

high Nessus Plugin ID 56511

Synopsis

It was possible to bypass authentication in a web application hosted on the remote web server.

Description

The instance of ManageEngine ADSelfService Plus running on the remote web server allows a remote attacker to bypass authentication and gain administrative access by including a parameter named 'resetUnLock' and setting it to 'true' when authenticating.

Solution

Upgrade to ADSelfService Plus version 4.5 Build 4522 or later.

See Also

http://www.nessus.org/u?62d4a5d1

http://www.nessus.org/u?49667271

Plugin Details

Severity: High

ID: 56511

File Name: manageengine_adselfservice_resetunlock_auth_bypass.nasl

Version: 1.9

Type: remote

Family: CGI abuses

Published: 10/14/2011

Updated: 1/19/2021

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 6.7

CVSS v2

Risk Factor: High

Base Score: 7.5

Temporal Score: 5.5

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Information

CPE: cpe:/a:zohocorp:manageengine_adselfservice_plus

Required KB Items: installed_sw/ManageEngine ADSelfService Plus

Excluded KB Items: Settings/disable_cgi_scanning

Exploit Ease: No known exploits are available

Exploited by Nessus: true

Patch Publication Date: 10/10/2011

Vulnerability Publication Date: 10/11/2011

Reference Information

CVE: CVE-2011-3485

BID: 50071