SB2023081125 - Multiple vulnerabilities in Zoho ManageEngine ServiceDesk Plus MSP



SB2023081125 - Multiple vulnerabilities in Zoho ManageEngine ServiceDesk Plus MSP

Published: August 11, 2023

Security Bulletin ID SB2023081125
Severity
Medium
Patch available
YES
Number of vulnerabilities 21
Exploitation vector Remote access
Highest impact Data manipulation

Breakdown by Severity

Medium 14% Low 86%
  • Low
  • Medium
  • High
  • Critical

Description

This security bulletin contains information about 21 secuirty vulnerabilities.


1) Cleartext storage of sensitive information (CVE-ID: N/A)

The vulnerability allows an attacker to gain access to sensitive information.

The vulnerability exists due to the API key is stored unencrypted in the server configuration table. An attacker with access to the server configuration table can obtain the key and use it to query the database.


2) Information disclosure (CVE-ID: N/A)

The vulnerability allows a remote user to gain access to potentially sensitive information.

The vulnerability exists due to excessive data output by the application. A remote user can associate child contracts with expired contracts..


3) Cross-site scripting (CVE-ID: N/A)

The disclosed vulnerability allows a remote attacker to perform cross-site scripting (XSS) attacks.

The vulnerability exists due to insufficient sanitization of user-supplied data in then left pane list view page in Purchase module. A remote attacker can trick the victim to follow a specially crafted link and execute arbitrary HTML and script code in user's browser in context of vulnerable website.

Successful exploitation of this vulnerability may allow a remote attacker to steal potentially sensitive information, change appearance of the web page, perform phishing and drive-by-download attacks.


4) Cross-site request forgery (CVE-ID: N/A)

The vulnerability allows a remote attacker to perform cross-site request forgery attacks.

The vulnerability exists due to insufficient validation of the HTTP request origin in logs. A remote attacker can trick the victim to visit a specially crafted web page and perform arbitrary actions on behalf of the victim on the vulnerable website.


5) Improper access control (CVE-ID: N/A)

The vulnerability allows a remote user to gain unauthorized access to otherwise restricted functionality.

The vulnerability exists due to improper access restrictions. A remote user can bypass implemented security restrictions and renew already renewed contracts.


6) Information disclosure (CVE-ID: N/A)

The vulnerability allows a remote user to gain access to potentially sensitive information.

The vulnerability exists due to excessive data output by the application. A remote user can associate parent contracts as child contracts.


7) Improper access control (CVE-ID: N/A)

The vulnerability allows a remote user to gain unauthorized access to otherwise restricted functionality.

The vulnerability exists due to improper access restrictions while creating purchase requests from service requests. A remote user can bypass implemented security restrictions and gain unauthorized access to the application.


8) Improper access control (CVE-ID: N/A)

The vulnerability allows a remote user to gain unauthorized access to otherwise restricted functionality.

The vulnerability exists due to improper access restrictions while downloading software license attachments. A remote user can bypass implemented security restrictions and gain access to sensitive information.


9) Permissions, Privileges, and Access Controls (CVE-ID: N/A)

The vulnerability allows a remote user to gain access to sensitive information.

The vulnerability exists due to disposed or expired workstations or servers are listed in software license operations. A remote user can gain access to potentially sensitive data.


10) Improper access control (CVE-ID: N/A)

The vulnerability allows a remote user to gain unauthorized access to otherwise restricted functionality.

The vulnerability exists due to improper access restrictions. A remote user can bypass implemented security restrictions and detach associated purchase requests.


11) Stored cross-site scripting (CVE-ID: N/A)

The disclosed vulnerability allows a remote user to perform cross-site scripting (XSS) attacks.

The vulnerability exists due to insufficient sanitization of user-supplied data in task title. A remote user can inject and execute arbitrary HTML and script code in user's browser in context of vulnerable website.

Successful exploitation of this vulnerability may allow a remote attacker to steal potentially sensitive information, change appearance of the web page, perform phishing and drive-by-download attacks.


12) Information disclosure (CVE-ID: N/A)

The vulnerability allows a remote user to gain access to potentially sensitive information.

The vulnerability exists due to excessive data output in Query Report API. A remote user can gain unauthorized access to sensitive information.


13) Improper access control (CVE-ID: N/A)

The vulnerability allows a remote user to gain unauthorized access to otherwise restricted functionality.

The vulnerability exists due to improper access restrictions while deleting software license attachments. A remote user can bypass implemented security restrictions.


14) Improper access control (CVE-ID: N/A)

The vulnerability allows a remote user to gain unauthorized access to otherwise restricted functionality.

The vulnerability exists due to improper access restrictions while fetching details of attachments in software licenses. A remote user can bypass implemented security restrictions and gain unauthorized access to the application.


15) Improper access control (CVE-ID: N/A)

The vulnerability allows a remote user to gain unauthorized access to otherwise restricted functionality.

The vulnerability exists due to improper access restrictions. A remote user can bypass implemented security restrictions and gain unauthorized access to the application while creating incident SLAs.


16) Inclusion of Sensitive Information in Log Files (CVE-ID: N/A)

The vulnerability allows a local user to gain access to sensitive information.

The vulnerability exists due to software stores sensitive information into log files. A local user can read the log files and gain access to sensitive data.


17) Improper access control (CVE-ID: N/A)

The vulnerability allows a remote user to gain unauthorized access to otherwise restricted functionality.

The vulnerability exists due to improper access restrictions related to removal of incident SLAs. A remote user can bypass implemented security restrictions and gain unauthorized access to the application.


18) Improper access control (CVE-ID: N/A)

The vulnerability allows a remote user to gain unauthorized access to otherwise restricted functionality.

The vulnerability exists due to improper access restrictions. A remote user can bypass implemented security restrictions and fetch list of software.


19) Improper Authentication (CVE-ID: N/A)

The vulnerability allows a remote user to escalate privileges within the application.

The vulnerability exists due to an error when generating authentication tokens. A remote user can bypass authentication process and gain unauthorized access to the application.


20) Server-Side Request Forgery (SSRF) (CVE-ID: N/A)

The disclosed vulnerability allows a remote attacker to perform SSRF attacks.

The vulnerability exists due to insufficient validation of user-supplied input. A remote attacker can send a specially crafted HTTP request and trick the application to initiate requests to arbitrary systems.

Successful exploitation of this vulnerability may allow a remote attacker gain access to sensitive data, located in the local network or send malicious requests to other servers from the vulnerable system.


21) Cross-site scripting (CVE-ID: N/A)

The disclosed vulnerability allows a remote attacker to perform cross-site scripting (XSS) attacks.

The vulnerability exists due to insufficient sanitization of user-supplied data in chat settings page. A remote attacker can trick the victim to follow a specially crafted link and execute arbitrary HTML and script code in user's browser in context of vulnerable website.

Successful exploitation of this vulnerability may allow a remote attacker to steal potentially sensitive information, change appearance of the web page, perform phishing and drive-by-download attacks.


Remediation

Install update from vendor's website.