PHP file inclusion in Zoho ManageEngine OpManager - #VU64671

 

PHP file inclusion in Zoho ManageEngine OpManager - #VU64671

Published: June 24, 2022


Vulnerability identifier: #VU64671
CSH Severity: High
CVSSv4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Amber
CVE-ID: N/A
CWE-ID: CWE-98
Exploitation vector: Remote access
Exploit availability: No public exploit available
Vulnerable software:
Zoho ManageEngine OpManager
Software vendor:
Zoho Corporation

Description

The vulnerability allows a remote attacker to include and execute arbitrary PHP files on the server.

The vulnerability exists due to incorrect input validation when including PHP files in sparkgateway component. A remote non-authenticated attacker can send a specially crafted HTTP request to the affected application, include and execute arbitrary PHP code on the system with privileges of the web server.


Remediation

Install updates from vendor's website.

External links