Lucene search

K
saintSAINT CorporationSAINT:25A1AE710DDC7BDF13922068FD6E1AB1
HistoryFeb 17, 2023 - 12:00 a.m.

Zoho ManageEngine ServiceDesk Plus SAMLResponse command execution

2023-02-1700:00:00
SAINT Corporation
my.saintcorporation.com
83
zoho manageengine
servicedesk plus
samlresponse
command execution
vulnerability
patch
windows
sso

9.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

0.975 High

EPSS

Percentile

100.0%

Added: 02/17/2023

Background

Zoho ManageEngine ServiceDesk Plus is IT helpdesk software.

Problem

A vulnerability in an outdated Apache Santuario library in ServiceDesk Plus allows a remote, unauthenticated attacker to execute arbitrary commands by sending a specially crafted **SAMLResponse** parameter to the SAML endpoint.

Resolution

Upgrade to ServiceDesk Plus 14004 or higher.

References

<https://www.manageengine.com/security/advisory/CVE/cve-2022-47966.html&gt;
<https://www.horizon3.ai/manageengine-cve-2022-47966-technical-deep-dive/&gt;

Limitations

The target must have been configured with SAML-based SSO at least once in the past in order to be exploitable.

Platforms

Windows

9.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

0.975 High

EPSS

Percentile

100.0%