Vulnerability Details : CVE-2015-7766
Public exploit exists!
PGSQL:SubmitQuery.do in ZOHO ManageEngine OpManager 11.6, 11.5, and earlier allows remote administrators to bypass SQL query restrictions via a comment in the query to api/json/admin/SubmitQuery, as demonstrated by "INSERT/**/INTO."
Products affected by CVE-2015-7766
- cpe:2.3:a:zohocorp:manageengine_opmanager:*:*:*:*:*:*:*:*
- cpe:2.3:a:zohocorp:manageengine_opmanager:11.6:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2015-7766
77.55%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 99 %
Percentile, the proportion of vulnerabilities that are scored at or less
Metasploit modules for CVE-2015-7766
-
ManageEngine OpManager Remote Code Execution
Disclosure Date: 2015-09-14First seen: 2020-04-26exploit/windows/http/manage_engine_opmanager_rceThis module exploits a default credential vulnerability in ManageEngine OpManager, where a default hidden account "IntegrationUser" with administrator privileges exists. The account has a default password of "plugin" which cannot be reset through the user interface. By
CVSS scores for CVE-2015-7766
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
9.0
|
HIGH | AV:N/AC:L/Au:S/C:C/I:C/A:C |
8.0
|
10.0
|
NIST |
CWE ids for CVE-2015-7766
-
Assigned by: nvd@nist.gov (Primary)
References for CVE-2015-7766
-
https://www.exploit-db.com/exploits/38221/
ManageEngine OpManager - Remote Code Execution (Metasploit)Exploit
-
http://seclists.org/fulldisclosure/2015/Sep/66
Full Disclosure: ManageEngine OpManager multiple vulnerabilities
-
http://www.rapid7.com/db/modules/exploit/windows/http/manage_engine_opmanager_rce
ManageEngine OpManager Remote Code ExecutionExploit
-
https://support.zoho.com/portal/manageengine/helpcenter/articles/pgsql-submitquery-do-vulnerability
PGSQL:SubmitQuery.do vulnerability (CVE-2015-7765, CVE-2015-7766)
-
http://packetstormsecurity.com/files/133596/ManageEngine-OpManager-Remote-Code-Execution.html
ManageEngine OpManager Remote Code Execution ≈ Packet StormExploit
Jump to