ManageEngine ServiceDesk Plus < 13.0 Build 13011 RCE

high Nessus Plugin ID 168359


The remote web server hosts an application that is affected by a remote code execution vulnerability.


A remote code execution vulnerability exists in ManageEngine ServiceDesk Plus prior to 13.0 Build 13011 due to a flaw in the Analytics Plus integration input field validation. Vulnerability requires an administrator role access.

Note that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number.


Upgrade to ManageEngine ServiceDesk Plus version 13.0 Build 13011, or later.

See Also

Plugin Details

Severity: High

ID: 168359

File Name: manageengine_servicedesk_13011.nasl

Version: 1.3

Type: remote

Family: CGI abuses

Published: 12/2/2022

Updated: 3/16/2023

Risk Information


Risk Factor: Medium

Score: 5.9


Risk Factor: High

Base Score: 8.3

Temporal Score: 6.1

Vector: AV:N/AC:L/Au:M/C:C/I:C/A:C

Temporal Vector: E:U/RL:OF/RC:C

CVSS Score Source: CVE-2022-40770


Risk Factor: High

Base Score: 7.2

Temporal Score: 6.3

Vector: CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H

Temporal Vector: E:U/RL:O/RC:C

Vulnerability Information

CPE: cpe:/a:zohocorp:manageengine_servicedesk_plus

Required KB Items: installed_sw/manageengine_servicedesk

Exploit Ease: No known exploits are available

Patch Publication Date: 9/27/2022

Vulnerability Publication Date: 11/22/2022

Reference Information

CVE: CVE-2022-40770

IAVA: 2022-A-0497-S