Zoho ManageEngine Asset Explorer 6.5 does not validate the System Center Configuration Manager (SCCM) database username when dynamically generating a command to schedule scans for SCCM. This allows an attacker to execute arbitrary commands on the AssetExplorer Server with NT AUTHORITY/SYSTEM privileges.
References
Link | Resource |
---|---|
http://packetstormsecurity.com/files/157731/ManageEngine-AssetExplorer-Authenticated-Command-Execution.html | Exploit Third Party Advisory VDB Entry |
http://seclists.org/fulldisclosure/2020/May/36 | Exploit Mailing List Third Party Advisory |
https://www.manageengine.com/products/asset-explorer/sp-readme.html | Vendor Advisory |
Configurations
History
No history.
Information
Published : 2020-03-23 17:15
Updated : 2023-02-03 19:38
NVD link : CVE-2019-19034
Mitre link : CVE-2019-19034
CVE.ORG link : CVE-2019-19034
JSON object : View
Products Affected
zohocorp
- manageengine_assetexplorer
CWE
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')