Lucene search

K
nessusThis script is Copyright (C) 2024 and is owned by Tenable, Inc. or an Affiliate thereof.MANAGEENGINE-SERVICEDESK-PLUS-MSP-CVE-2024-27314.NASL
HistoryMay 24, 2024 - 12:00 a.m.

ManageEngine ServiceDesk Plus MSP < 14.7 Build 14720

2024-05-2400:00:00
This script is Copyright (C) 2024 and is owned by Tenable, Inc. or an Affiliate thereof.
www.tenable.com
2
cross-site scripting
sdadmin role
custom actions menu

2.4 Low

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

HIGH

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:N/I:L/A:N

3.4 Low

AI Score

Confidence

High

0.0004 Low

EPSS

Percentile

9.0%

The version of ManageEngine ServiceDesk Plus MSP installed on the remote host is prior to 14.7 Build 14720. It is, therefore, affected by a vulnerability as referenced in the service-desk-msp_cve-2024-27314 advisory.

  • A stored cross-site scripting (XSS) vulnerability allowed users with the SDAdmin role to inject a malicious JavaScript in the Custom Actions menu on the request details page. The script is executed when a user opens a request, accesses the custom menu, and clicks on the button with the Execute script action type. (CVE-2024-27314)

Note that Nessus has not tested for this issue but has instead relied only on the application’s self-reported version number.

#%NASL_MIN_LEVEL 80900
##
# (C) Tenable, Inc.
##

include('compat.inc');

if (description)
{
  script_id(197901);
  script_version("1.3");
  script_set_attribute(attribute:"plugin_modification_date", value:"2024/05/31");

  script_cve_id("CVE-2024-27314");
  script_xref(name:"IAVA", value:"2024-A-0312");

  script_name(english:"ManageEngine ServiceDesk Plus MSP < 14.7 Build 14720");

  script_set_attribute(attribute:"synopsis", value:
"The remote web server hosts an application that is affected by a vulnerability.");
  script_set_attribute(attribute:"description", value:
"The version of ManageEngine ServiceDesk Plus MSP installed on the remote host is prior to 14.7 Build 14720. It is,
therefore, affected by a vulnerability as referenced in the service-desk-msp_cve-2024-27314 advisory.

  - A stored cross-site scripting (XSS) vulnerability allowed users with the SDAdmin role to inject a
    malicious JavaScript in the Custom Actions menu on the request details page. The script is executed when a
    user opens a request, accesses the custom menu, and clicks on the button with the Execute script action
    type. (CVE-2024-27314)

Note that Nessus has not tested for this issue but has instead relied only on the application's self-reported version
number.");
  script_set_attribute(attribute:"see_also", value:"https://manageengine.com/products/service-desk/cve-2024-27314.html");
  script_set_attribute(attribute:"solution", value:
"Upgrade to ManageEngine ServiceDesk Plus MSP version 14.7 Build 14720 or later.");
  script_set_cvss_base_vector("CVSS2#AV:N/AC:M/Au:S/C:N/I:P/A:N");
  script_set_cvss_temporal_vector("CVSS2#E:U/RL:OF/RC:C");
  script_set_cvss3_base_vector("CVSS:3.0/AV:N/AC:L/PR:H/UI:R/S:U/C:N/I:L/A:N");
  script_set_cvss3_temporal_vector("CVSS:3.0/E:U/RL:O/RC:C");
  script_set_attribute(attribute:"cvss_score_source", value:"CVE-2024-27314");

  script_set_attribute(attribute:"exploitability_ease", value:"No known exploits are available");
  script_set_attribute(attribute:"exploit_available", value:"false");

  script_set_attribute(attribute:"vuln_publication_date", value:"2024/05/22");
  script_set_attribute(attribute:"patch_publication_date", value:"2024/05/22");
  script_set_attribute(attribute:"plugin_publication_date", value:"2024/05/24");

  script_set_attribute(attribute:"plugin_type", value:"remote");
  script_set_attribute(attribute:"cpe", value:"cpe:/a:zohocorp:manageengine_servicedesk_plus_msp");
  script_set_attribute(attribute:"generated_plugin", value:"current");
  script_set_attribute(attribute:"stig_severity", value:"II");
  script_end_attributes();

  script_category(ACT_GATHER_INFO);
  script_family(english:"CGI abuses");

  script_copyright(english:"This script is Copyright (C) 2024 and is owned by Tenable, Inc. or an Affiliate thereof.");

  script_dependencies("manageengine_servicedesk_detect.nasl");
  script_require_keys("installed_sw/manageengine_servicedesk");
  script_require_ports("Services/www", 8080);

  exit(0);
}

include('vcf_extras_zoho.inc');
include('http.inc');
var port = get_http_port(default:8080);
var appname = 'ManageEngine ServiceDesk Plus MSP';

var app_info = vcf::zoho::servicedesk::get_app_info(app:appname, port:port);

var constraints = [
  { 'max_version' : '14.7.14710', 'fixed_version' : '14.7.14720', 'fixed_display' : '14.7 Build 14720' }
];
vcf::check_version_and_report(
    app_info:app_info,
    constraints:constraints,
    severity:SECURITY_NOTE,
    flags:{'xss':TRUE}
);
VendorProductVersionCPE
zohocorpmanageengine_servicedesk_plus_mspcpe:/a:zohocorp:manageengine_servicedesk_plus_msp

2.4 Low

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

HIGH

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:N/I:L/A:N

3.4 Low

AI Score

Confidence

High

0.0004 Low

EPSS

Percentile

9.0%

Related for MANAGEENGINE-SERVICEDESK-PLUS-MSP-CVE-2024-27314.NASL