#VU64671 PHP file inclusion in Zoho ManageEngine OpManager 

 

#VU64671 PHP file inclusion in Zoho ManageEngine OpManager

Published: June 24, 2022


Vulnerability identifier: #VU64671
Vulnerability risk: High
CVSSv4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Amber
CVE-ID: N/A
CWE-ID: CWE-98
Exploitation vector: Remote access
Exploit availability: No public exploit available
Vulnerable software:
Zoho ManageEngine OpManager
Software vendor:
Zoho Corporation

Description

The vulnerability allows a remote attacker to include and execute arbitrary PHP files on the server.

The vulnerability exists due to incorrect input validation when including PHP files in sparkgateway component. A remote non-authenticated attacker can send a specially crafted HTTP request to the affected application, include and execute arbitrary PHP code on the system with privileges of the web server.


Remediation

Install updates from vendor's website.

External links