First published: Mon Feb 17 2020(Updated: )
An issue was discovered in Zoho ManageEngine Remote Access Plus 10.0.447. The service to test the mail-server configuration suffers from an authorization issue allowing a user with the Guest role (read-only access) to use and abuse it. One of the abuses allows performing network and port scan operations of the localhost or the hosts on the same network segment, aka SSRF.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Zohocorp Manageengine Remote Access Plus | =10.0.447 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-20474 is a vulnerability discovered in Zoho ManageEngine Remote Access Plus 10.0.447.
CVE-2019-20474 has a severity rating of 4.3, which is considered medium.
CVE-2019-20474 allows a user with the Guest role to abuse the mail-server configuration service and perform unauthorized network and port scan operations.
To fix CVE-2019-20474, it is recommended to upgrade Zoho ManageEngine Remote Access Plus to a version that is not affected.
You can find more information about CVE-2019-20474 on the following websites: [excellium-services.com](https://excellium-services.com/cert-xlm-advisory/cve-2019-20474/) and [manageengine.com](https://www.manageengine.com/remote-desktop-management/knowledge-base/authorization-failure.html).