CVE-2014-5005
ManageEngine Desktop Central MSP StatusUpdateServlet fileName File Upload Remote Code Execution Vulnerability
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
5Exploited in Wild
-Decision
Descriptions
Directory traversal vulnerability in ZOHO ManageEngine Desktop Central (DC) before 9 build 90055 allows remote attackers to execute arbitrary code via a .. (dot dot) in the fileName parameter in an LFU action to statusUpdate.
Vulnerabilidad de salto de directorio en ZOHO ManageEngine Desktop Central (DC) anterior a 9 build 90055 permite a atacantes remotos ejecutar código arbitrario a través de un .. (punto punto) en el parámetro fileName en una acción LFU en statusUpdate.
This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of ManageEngine Desktop Central MSP. Authentication is not required to exploit this vulnerability.
The specific flaw exists within the StatusUpdateServlet servlet. The issue lies in the failure to sanitize the filenames uploaded to the servlet. An attacker can leverage this vulnerability to execute code under the context of SYSTEM.
ManageEngine Desktop Central suffers from code execution and remote shell upload vulnerabilities.
CVSS Scores
SSVC
- Decision:-
Timeline
- 2014-07-18 CVE Reserved
- 2014-08-31 CVE Published
- 2014-09-01 First Exploit
- 2024-08-06 CVE Updated
- 2024-10-19 EPSS Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
CWE
- CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
CAPEC
References (8)
URL | Tag | Source |
---|---|---|
http://osvdb.org/show/osvdb/110643 | Vdb Entry | |
https://www.manageengine.com/products/desktop-central/remote-code-execution.html | X_refsource_confirm | |
https://seclists.org/fulldisclosure/2014/Aug/88 |
URL | Date | SRC |
---|---|---|
https://www.exploit-db.com/exploits/34518 | 2014-09-01 | |
https://www.exploit-db.com/exploits/34594 | 2014-09-09 | |
http://seclists.org/fulldisclosure/2014/Aug/88 | 2024-08-06 | |
http://www.exploit-db.com/exploits/34594 | 2024-08-06 | |
https://raw.githubusercontent.com/pedrib/PoC/master/ManageEngine/me_dc9_file_upload.txt | 2024-08-06 |
URL | Date | SRC |
---|
URL | Date | SRC |
---|
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Zohocorp Search vendor "Zohocorp" | Manageengine Desktop Central Search vendor "Zohocorp" for product "Manageengine Desktop Central" | <= 9.0 Search vendor "Zohocorp" for product "Manageengine Desktop Central" and version " <= 9.0" | - |
Affected
|