ManageEngine OpManager Plus < 12.7.109 / 12.7.110 < 12.7.120 / 12.7.121 < 12.7.131 Cross-Site WebSocket Hijacking

high Nessus Plugin ID 179655

Synopsis

An Active Directory management application running on the remote host is affected by an authenticated XML external entity injection vulnerability.

Description

The version of ManageEngine OpManager running on the remote web server is prior to 12.7.109, or version 12.7.110 prior to 12.7.120, or version 12.7.121 prior to 12.7.131. It therefore has a vulnerability in the WebSocket endpoint that allows Cross-site WebSocket hijacking.

Note that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number.

Solution

Upgrade ManageEngine OpManager according to the vendor advisory.

See Also

http://www.nessus.org/u?980f64b4

http://www.nessus.org/u?1981ec1f

http://www.nessus.org/u?4984a655

Plugin Details

Severity: High

ID: 179655

File Name: manageengine_opmanager_CVE-2023-29505.nasl

Version: 1.4

Type: remote

Family: CGI abuses

Published: 8/10/2023

Updated: 10/27/2023

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 5.9

CVSS v2

Risk Factor: Critical

Base Score: 10

Temporal Score: 7.4

Vector: CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C

CVSS Score Source: CVE-2023-29505

CVSS v3

Risk Factor: High

Base Score: 8.8

Temporal Score: 7.7

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

Temporal Vector: CVSS:3.0/E:U/RL:O/RC:C

Vulnerability Information

CPE: cpe:/a:zohocorp:manageengine_opmanager

Required KB Items: installed_sw/ManageEngine OpManager

Exploit Ease: No known exploits are available

Patch Publication Date: 6/18/2023

Vulnerability Publication Date: 8/3/2023

Reference Information

CVE: CVE-2023-29505

IAVA: 2023-A-0395