Vulnerability Details : CVE-2014-5301
Directory traversal vulnerability in ServiceDesk Plus MSP v5 to v9.0 v9030; AssetExplorer v4 to v6.1; SupportCenter v5 to v7.9; IT360 v8 to v10.4.
Vulnerability category: Directory traversal
At least one public exploit which can be used to exploit this vulnerability exists!
Exploit prediction scoring system (EPSS) score for CVE-2014-5301
Probability of exploitation activity in the next 30 days: 97.16%
Percentile, the proportion of vulnerabilities that are scored at or less: ~ 100 % EPSS Score History EPSS FAQ
Metasploit modules for CVE-2014-5301
-
ManageEngine Multiple Products Authenticated File Upload
Disclosure Date : 2014-12-15exploit/multi/http/manageengine_auth_uploadThis module exploits a directory traversal vulnerability in ManageEngine ServiceDesk, AssetExplorer, SupportCenter and IT360 when uploading attachment files. The JSP that accepts the upload does not handle correctly '../' sequences, which can be abused to write to the file system. Authentication is needed to exploit this vulnerability, but this module will attempt to login using the default credentials for the administrator and guest accounts. Alternatively, you can provide a pre-authenticated cookie or a username / password. For IT360 targets, enter the RPORT of the ServiceDesk instance (usually 8400). All versions of ServiceDesk prior v9 build 9031 (including MSP but excluding v4), AssetExplorer, SupportCenter and IT360 (including MSP) are vulnerable. At the time of release of this module, only ServiceDesk v9 has been fixed in build 9031 and above. This module has been tested successfully in Wind
CVSS scores for CVE-2014-5301
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Source |
---|---|---|---|---|---|
9.0
|
HIGH | AV:N/AC:L/Au:S/C:C/I:C/A:C |
8.0
|
10.0
|
[email protected] |
8.8
|
HIGH | CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H |
2.8
|
5.9
|
[email protected] |
CWE ids for CVE-2014-5301
-
The product uses external input to construct a pathname that is intended to identify a file or directory that is located underneath a restricted parent directory, but the product does not properly neutralize special elements within the pathname that can cause the pathname to resolve to a location that is outside of the restricted directory.Assigned by: [email protected] (Primary)
References for CVE-2014-5301
-
http://seclists.org/fulldisclosure/2015/Jan/5
Exploit;Mailing List;Third Party Advisory
-
http://secunia.com/advisories/62105
Permissions Required
-
https://exchange.xforce.ibmcloud.com/vulnerabilities/99610
-
http://packetstormsecurity.com/files/130020/ManageEngine-Multiple-Products-Authenticated-File-Upload.html
Exploit;Third Party Advisory;VDB Entry
- http://www.securityfocus.com/archive/1/534377/100/0/threaded
-
http://packetstormsecurity.com/files/129806/ManageEngine-Shell-Upload-Directory-Traversal.html
Exploit;Third Party Advisory;VDB Entry
-
https://www.exploit-db.com/exploits/35845/
Exploit;Third Party Advisory;VDB Entry
Products affected by CVE-2014-5301
- cpe:2.3:a:manageengine:servicedesk_plus:-:*:*:*:*:*:*:*
- cpe:2.3:a:manageengine:assetexplorer:-:*:*:*:*:*:*:*
- cpe:2.3:a:manageengine:it360:-:*:*:*:*:*:*:*
- cpe:2.3:a:manageengine:supportcenter:-:*:*:*:*:*:*:*