Vulnerability Details : CVE-2015-1480
ZOHO ManageEngine ServiceDesk Plus (SDP) before 9.0 build 9031 allows remote authenticated users to obtain sensitive ticket information via a (1) getTicketData action to servlet/AJaxServlet or a direct request to (2) swf/flashreport.swf, (3) reports/flash/details.jsp, or (4) reports/CreateReportTable.jsp.
Vulnerability category: Information leak
Exploit prediction scoring system (EPSS) score for CVE-2015-1480
Probability of exploitation activity in the next 30 days: 75.57%
Percentile, the proportion of vulnerabilities that are scored at or less: ~ 98 % EPSS Score History EPSS FAQ
CVSS scores for CVE-2015-1480
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source |
---|---|---|---|---|---|
4.0
|
MEDIUM | AV:N/AC:L/Au:S/C:P/I:N/A:N |
8.0
|
2.9
|
NIST |
CWE ids for CVE-2015-1480
-
The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information.Assigned by: nvd@nist.gov (Primary)
References for CVE-2015-1480
-
http://www.rewterz.com/vulnerabilities/manageengine-servicedesk-plus-user-privileges-management-vulnerability
ManageEngine ServiceDesk Plus User Privileges Management Vulnerability | Rewterz - Information Security Company - UAE - Oman - Qatar - Bahrain - Saudi Arabia - PakistanExploit
-
http://www.exploit-db.com/exploits/35904
ManageEngine ServiceDesk Plus 9.0 < Build 9031 - User Privileges ManagementExploit
-
http://www.securityfocus.com/archive/1/534538/100/0/threaded
SecurityFocus
-
http://packetstormsecurity.com/files/130081/ManageEngine-ServiceDesk-Plus-9.0-Privilege-Escalation.html
ManageEngine ServiceDesk Plus 9.0 Privilege Escalation ≈ Packet StormExploit
-
http://www.manageengine.com/products/service-desk/readme-9.0.html
Readme | Hotfix & updates | ManageEngine ServiceDesk PlusVendor Advisory
-
http://www.securityfocus.com/bid/72302
ManageEngine ServiceDesk Plus Privilage Escalation Vulnerability
Products affected by CVE-2015-1480
- cpe:2.3:a:manageengine:servicedesk_plus:*:*:*:*:*:*:*:*