Goby/json/Zoho-ManageEngine-Desktop-C...

50 lines
1.9 KiB
JSON

{
"Name": "Zoho ManageEngine Desktop Central 10 getChartImage rce (CVE-2020-10189)",
"Description": "Zoho ManageEngine Desktop Central 10 allows remote code execution because of deserialization of untrusted data in getChartImage in the FileStorage class. This is related to the CewolfServlet and MDMLogUploaderServlet servlets.",
"Product": "ManageEngineDesktopCentral",
"Homepage": "https://www.manageengine.com/products/desktop-central/",
"DisclosureDate": "2020-03-06",
"Author": "gobysec@gmail.com",
"GifAddress": "https://raw.githubusercontent.com/gobysec/GobyVuls/master/ManageEngine/CVE-2020-10189/CVE-2020-10189.gif",
"FofaQuery": "title=\"ManageEngine Desktop Central\" || header=DCJSESSIONID",
"GobyQuery": "title=\"ManageEngine Desktop Central\" || header=DCJSESSIONID",
"Level": "3",
"Impact": "An unauthenticated attacker can reach a Deserialization of Untrusted Data vulnerability that can allow them to execute arbitrary code as SYSTEM/root.",
"Recommendation": "",
"References": [
"https://srcincite.io/advisories/src-2020-0011/",
"https://srcincite.io/pocs/src-2020-0011.py.txt",
"https://www.zdnet.com/article/zoho-zero-day-published-on-twitter/",
"https://nvd.nist.gov/vuln/detail/CVE-2020-10189",
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10189"
],
"HasExp": true,
"ExpParams": [{
"name": "AttackType",
"type": "select",
"value": "cmd,goby_powershell"
},{
"name": "cmd",
"type": "input",
"value": "whoami",
"show": "AttackType=cmd"
}],
"ExpTips": {
"Type": "",
"Content": ""
},
"ScanSteps": null,
"ExploitSteps": null,
"Tags": null,
"CVEIDs": [
"CVE-2020-10189"
],
"CVSSScore": "9.8",
"AttackSurfaces": {
"Application": null,
"Support": null,
"Service": null,
"System": null,
"Hardware": null
}
}