ManageEngine ServiceDesk Plus < 13.0 Build 13011 RCE

high Nessus Plugin ID 168359

Synopsis

The remote web server hosts an application that is affected by a remote code execution vulnerability.

Description

A remote code execution vulnerability exists in ManageEngine ServiceDesk Plus prior to 13.0 Build 13011 due to a flaw in the Analytics Plus integration input field validation. Vulnerability requires an administrator role access.

Note that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number.

Solution

Upgrade to ManageEngine ServiceDesk Plus version 13.0 Build 13011, or later.

See Also

http://www.nessus.org/u?888eb2db

http://www.nessus.org/u?40ba6aa6

Plugin Details

Severity: High

ID: 168359

File Name: manageengine_servicedesk_13011.nasl

Version: 1.3

Type: remote

Family: CGI abuses

Published: 12/2/2022

Updated: 3/16/2023

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 5.9

CVSS v2

Risk Factor: High

Base Score: 8.3

Temporal Score: 6.1

Vector: CVSS2#AV:N/AC:L/Au:M/C:C/I:C/A:C

CVSS Score Source: CVE-2022-40770

CVSS v3

Risk Factor: High

Base Score: 7.2

Temporal Score: 6.3

Vector: CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H

Temporal Vector: CVSS:3.0/E:U/RL:O/RC:C

Vulnerability Information

CPE: cpe:/a:zohocorp:manageengine_servicedesk_plus

Required KB Items: installed_sw/manageengine_servicedesk

Exploit Ease: No known exploits are available

Patch Publication Date: 9/27/2022

Vulnerability Publication Date: 11/22/2022

Reference Information

CVE: CVE-2022-40770

IAVA: 2022-A-0497-S