Lucene search

K
exploitpackDigital InterruptionEXPLOITPACK:8D51C5487E5AC0CAB7FC4F1F0E98DFE0
HistoryApr 16, 2019 - 12:00 a.m.

Zoho ManageEngine ADManager Plus 6.6 (Build 6659) - Privilege Escalation

2019-04-1600:00:00
Digital Interruption
18

0.001 Low

EPSS

Percentile

27.0%

Zoho ManageEngine ADManager Plus 6.6 (Build 6659) - Privilege Escalation

# Exploit Title: Zoho ManageEngine ADManager Plus 6.6 (Build < 6659) Privilege Escalation
# Date: 15th April 2019
# Exploit Author: Digital Interruption
# Vendor Homepage: https://www.manageengine.co.uk/
# Version: 6.6 (Build 6658)
# Tested on: Windows Server 2012 R2
# CVE : CVE-2018-19374

Due to weak permissions setup on the bin, lib and tools directories within the ManageEngine installation directory, it is possible for any authenticated user to modify several core files.

To escalate privileges to that of LOCAL SYSTEM, drop a payload onto the system and then add a line to bin\ChangeJRE.bat to execute it every time the system is rebooted.

0.001 Low

EPSS

Percentile

27.0%

Related for EXPLOITPACK:8D51C5487E5AC0CAB7FC4F1F0E98DFE0