ManageEngine Desktop Central Remote Security Bypass

critical Nessus Plugin ID 82081

Synopsis

The remote web server contains a Java web application that is affected by a security bypass vulnerability.

Description

The version of ManageEngine Desktop Central running on the remote host is affected by a remote security bypass vulnerability, due to a failure to restrict access to 'DCPluginServelet'. This allows an unauthenticated, remote attacker to create an account with full administrative privileges within DesktopCentral and then perform any tasks DesktopCentral administrative users could perform, including the execution of code and commands on systems managed by DesktopCentral.

Solution

Upgrade to ManageEngine Desktop Central 9 build 90109 or later.

See Also

https://seclists.org/fulldisclosure/2015/Jan/2

Plugin Details

Severity: Critical

ID: 82081

File Name: manageengine_desktop_central_90109_user_add_safe.nasl

Version: 1.10

Type: remote

Family: CGI abuses

Published: 3/25/2015

Updated: 1/19/2021

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 6.7

CVSS v2

Risk Factor: High

Base Score: 7.5

Temporal Score: 5.9

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P

CVSS Score Source: CVE-2014-7862

CVSS v3

Risk Factor: Critical

Base Score: 9.8

Temporal Score: 8.8

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Temporal Vector: CVSS:3.0/E:P/RL:O/RC:C

Vulnerability Information

CPE: cpe:/a:zohocorp:manageengine_desktop_central

Required KB Items: installed_sw/ManageEngine Desktop Central

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 1/5/2015

Vulnerability Publication Date: 12/31/2014

Reference Information

CVE: CVE-2014-7862

BID: 71849