First published: Fri Dec 13 2019(Updated: )
An issue was discovered in Zoho ManageEngine EventLog Analyzer 10.0 SP1 before Build 12110. By running "select hostdetails from hostdetails" at the /event/runquery.do endpoint, it is possible to bypass the security restrictions that prevent even administrative users from viewing credential data stored in the database, and recover the MD5 hashes of the accounts used to authenticate the ManageEngine platform to the managed machines on the network (most often administrative accounts). Specifically, this bypasses these restrictions: a query cannot mention password, and a query result cannot have a password column.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Zohocorp Manageengine Eventlog Analyzer | >=10.0<12.1.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2019-19774 is high with a CVSS score of 8.8.
The affected software for CVE-2019-19774 is Zoho ManageEngine EventLog Analyzer version 10.0 SP1 before Build 12110, with versions up to 12.1.1.
To exploit CVE-2019-19774, run the following command at the /event/runquery.do endpoint: "select hostdetails from hostdetails". This allows bypassing security restrictions and viewing credential data stored in Zoho ManageEngine EventLog Analyzer.
Yes, even administrative users are affected by CVE-2019-19774, as they are prevented from viewing credential data stored in Zoho ManageEngine EventLog Analyzer.
To fix CVE-2019-19774, update Zoho ManageEngine EventLog Analyzer to version Build 12110 or higher.