ManageEngine Desktop Central Remote Security Bypass (Intrusive Check)

Critical Nessus Plugin ID 82080

Synopsis

The remote web server contains a Java web application that is affected by a security bypass vulnerability.

Description

The version of ManageEngine Desktop Central running on the remote host is affected by a remote security bypass vulnerability, due to a failure to restrict access to 'DCPluginServelet'. This allows an unauthenticated, remote attacker to create an account with full administrative privileges within DesktopCentral and then perform any tasks DesktopCentral administrative users could perform, including the execution of code and commands on systems managed by DesktopCentral.

Solution

Upgrade to ManageEngine Desktop Central 9 build 90109 or later.

See Also

https://seclists.org/fulldisclosure/2015/Jan/2

Plugin Details

Severity: Critical

ID: 82080

File Name: manageengine_desktop_central_90109_user_add.nasl

Version: 1.7

Type: remote

Family: CGI abuses

Published: 2015/03/25

Updated: 2018/11/28

Dependencies: 71216

Risk Information

Risk Factor: Critical

CVSS v2.0

Base Score: 10

Temporal Score: 7.8

Vector: CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C

Temporal Vector: CVSS2#E:POC/RL:OF/RC:ND

Vulnerability Information

CPE: cpe:/a:zohocorp:manageengine_desktop_central

Required KB Items: installed_sw/ManageEngine Desktop Central

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 2015/01/05

Vulnerability Publication Date: 2014/12/31

Reference Information

CVE: CVE-2014-7862

BID: 71849