First published: Fri May 20 2022(Updated: )
Zoho ManageEngine ADSelfService Plus before 6202 allows attackers to perform username enumeration via a crafted POST request to /ServletAPI/accounts/login.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Zohocorp Manageengine Adselfservice Plus | =6.1-6121 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2022-28987 is medium with a severity value of 5.3.
CVE-2022-28987 allows attackers to perform username enumeration in Zoho ManageEngine ADSelfService Plus.
An attacker can exploit CVE-2022-28987 by sending a crafted POST request to /ServletAPI/accounts/login.
Yes, a fix is available for CVE-2022-28987. It is recommended to update to Zoho ManageEngine ADSelfService Plus version 6.2.0.2.
More information about CVE-2022-28987 can be found at the following references: [Reference 1](https://github.com/passtheticket/vulnerability-research/blob/main/manage-engine-apps/adselfservice-userenum.md), [Reference 2](https://github.com/passtheticket/vulnerability-research/blob/main/manage-engine-apps/adselfservice-userenum.py), [Reference 3](https://www.manageengine.com/products/self-service-password/advisory/CVE-2022-28987.html).