First published: Mon Aug 09 2021(Updated: )
** DISPUTED ** A CSV injection vulnerability on the login panel of ManageEngine ADSelfService Plus Version: 6.1 Build No: 6101 can be exploited by an unauthenticated user. The j_username parameter seems to be vulnerable and a reverse shell could be obtained if a privileged user exports "User Attempts Audit Report" as CSV file. Note: The vendor disputes this vulnerability, claiming "This is not a valid vulnerability in our ADSSP product. We don't see this as a security issue at our side."
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Zohocorp Manageengine Adselfservice Plus | =6.1-6101 | |
=6.1-6101 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-33256 is a CSV injection vulnerability on the login panel of ManageEngine ADSelfService Plus Version 6.1 Build No 6101.
The severity of CVE-2021-33256 is critical with a CVSS score of 8.8.
An unauthenticated user can exploit CVE-2021-33256 by using the j_username parameter to inject a CSV payload.
CVE-2021-33256 can allow an attacker to execute arbitrary commands or obtain a reverse shell on the affected system.
At the moment, there is no official fix or patch available for CVE-2021-33256. It is recommended to follow the mitigation steps provided by the vendor.