Lucene search

K
packetstormChan Nyein Wai, Thura Moe MyintPACKETSTORM:171626
HistoryApr 03, 2023 - 12:00 a.m.

AD Manager Plus 7122 Remote Code Execution

2023-04-0300:00:00
Chan Nyein Wai, Thura Moe Myint
packetstormsecurity.com
191

10 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H

9.3 High

CVSS2

Access Vector

NETWORK

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:M/Au:N/C:C/I:C/A:C

`# Exploit Title: AD Manager Plus 7122 - Remote Code Execution (RCE)  
# Exploit Author: Chan Nyein Wai & Thura Moe Myint  
# Vendor Homepage: https://www.manageengine.com/products/ad-manager/  
# Software Link: https://www.manageengine.com/products/ad-manager/download.html  
# Version: Ad Manager Plus Before 7122  
# Tested on: Windows  
# CVE : CVE-2021-44228  
# Github Repo: https://github.com/channyein1337/research/blob/main/Ad-Manager-Plus-Log4j-poc.md  
  
### Description  
  
In the summer of 2022, I have been doing security engagement on Synack  
Red Team in the collaboration with my good friend (Thura Moe Myint).  
At that time, Log4j was already widespread on the internet. Manage  
Engine had already patched the Ad Manager Plus to prevent it from  
being affected by the Log4j vulnerability. They had mentioned that  
Log4j was not affected by Ad Manager Plus. However, we determined that  
the Ad Manager Plus was running on our target and managed to exploit  
the Log4j vulnerability.  
  
### Exploitation  
  
First, Let’s make a login request using proxy.  
  
Inject the following payload in the ```methodToCall``` parameter in  
the ```ADSearch.cc``` request.  
  
Then you will get the dns callback with username in your burp collabrator.  
  
  
  
  
### Notes  
  
When we initially reported this vulnerability to Synack, we only  
managed to get a DNS callback and our report was marked as LDAP  
injection. However, we attempted to gain full RCE on the host but were  
not successful. Later, we discovered that Ad Manager Plus was running  
on another target, so we tried to get full RCE on that target. We  
realized that there was a firewall and an anti-virus running on the  
machine, so most of our payloads wouldn't work. After spending a  
considerable amount of time , we eventually managed to bypass the  
firewall and anti-virus, and achieve full RCE.  
  
### Conclusion  
  
We had already informed Zoho about the log4j vulnerability, and even  
after it was fixed, they decided to reward us with a bonus bounty for  
our report.  
  
### Mitigation  
  
Updating to a version of Ad Manager Plus higher than 7122 should  
resolve the issue.  
  
`

10 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H

9.3 High

CVSS2

Access Vector

NETWORK

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:M/Au:N/C:C/I:C/A:C