Lucene search

K
impervablogDaniel JohnstonIMPERVABLOG:E3068E5C16504E4E7591776B5E79213F
HistoryJan 20, 2023 - 6:16 p.m.

ManageEngine Vulnerability CVE-2022-47966

2023-01-2018:16:02
Daniel Johnston
www.imperva.com
17

9.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Recently, Zoho ManageEngine released a security advisory for CVE-2022-47966, which allows for pre-authentication remote code execution in at least 24 ManageEngine products, including ADSelfService Plus and ServiceDesk Plus. This vulnerability stems from the products’ use of an outdated Apache Santuario library for XML signature validation, and allows an attacker to conduct remote code execution (RCE) by sending an HTTP POST request with a malicious SAML response.

This vulnerability is actively exploited in the wild. Requests attempting to exploit this vulnerability peaked on 20 January, right after public exploit code and deep dives were released. Collectively, we’ve seen almost 2,000 attack attempts this month, targeting almost 1,000 distinct sites, mostly based in the US and the Netherlands.

At this point, most attempts are conducting out-of-band application security testing (OAST) in an attempt to see if the targeted machines are vulnerable, but it’s likely that DDoS bots, crypto miners, and other attacks will soon follow.

Imperva WAF customers are protected out of the box, but all users of the affected ManageEngine products should update to a patched version immediately.

The post ManageEngine Vulnerability CVE-2022-47966 appeared first on Blog.

9.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H