First published: Fri Sep 21 2018(Updated: )
Zoho ManageEngine OpManager before 12.3 Build 123196 does not require authentication for /oputilsServlet requests, as demonstrated by a /oputilsServlet?action=getAPIKey request that can be leveraged against Firewall Analyzer to add an admin user via /api/json/v2/admin/addUser or conduct a SQL Injection attack via the /api/json/device/setManaged name parameter.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
ManageEngine OpManager | <12.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-17283 is a vulnerability in Zoho ManageEngine OpManager before 12.3 Build 123196 that allows unauthorized access to certain API requests.
CVE-2018-17283 has a severity score of 7.5 out of 10, which is considered high.
To exploit CVE-2018-17283, an attacker can use a specially crafted request to gain unauthorized access or conduct SQL injections on the affected system.
Yes, updating Zoho ManageEngine OpManager to version 12.3 Build 123196 or later resolves CVE-2018-17283.
You can find more information about CVE-2018-17283 at the following references: [Reference 1](https://github.com/x-f1v3/ForCve/issues/4) and [Reference 2](https://www.manageengine.com/network-monitoring/help/read-me.html).