Summary
This host is running Zoho ManageEngine Support Center Plus and is prone to multiple vulnerabilities.
Impact
Successful exploitation will allow remote attackers to upload malicious code (backdoors/shells) or insert arbitrary HTML and script code, which will be executed in a user's browser session in the context of an affected site.
Impact Level: Application
Solution
No solution or patch was made available for at least one year since disclosure of this vulnerability. Likely none will be provided anymore.
General solution options are to upgrade to a newer release, disable respective features, remove the product or replace the product by another one.
Insight
Multiple flaws are due to,
- An improper checking of image extension when uploading the files. This will lead to uploading web site files which could be used for malicious actions.
- An input passed to the 'fromCustomer' parameter via 'HomePage.do' script is not properly sanitised before being returned to the user.
- An input passed to multiple parameters via 'WorkOrder.do' script is not properly sanitised before being returned to the user.
Affected
ManageEngine Support Center Plus 7.9 Upgrade Pack 7908 and prior
References
Severity
Classification
-
CVSS Base Score: 7.5
AV:N/AC:L/Au:N/C:P/I:P/A:P
Related Vulnerabilities
- Apache Struts2 Showcase Skill Name Remote Code Execution Vulnerability
- ActivDesk Multiple Cross Site Scripting and SQL Injection Vulnerabilities
- Apache Tomcat Windows Installer Privilege Escalation Vulnerability
- Apache Tomcat /servlet Cross Site Scripting
- Apache Struts2 Showcase Arbitrary Java Method Execution vulnerability