CWE
345
Advisory Published
Advisory Published
Updated

CVE-2023-35719: (0Day) ManageEngine ADSelfService Plus GINA Client Insufficient Verification of Data Authenticity Authentication Bypass Vulnerability

First published: Wed Sep 06 2023(Updated: )

ManageEngine ADSelfService Plus GINA Client Insufficient Verification of Data Authenticity Authentication Bypass Vulnerability. This vulnerability allows physically present attackers to execute arbitrary code on affected installations of ManageEngine ADSelfService Plus. Authentication is not required to exploit this vulnerability. The specific flaw exists within the Password Reset Portal used by the GINA client. The issue results from the lack of proper authentication of data received via HTTP. An attacker can leverage this vulnerability to bypass authentication and execute code in the context of SYSTEM. Was ZDI-CAN-17009.

Credit: zdi-disclosures@trendmicro.com zdi-disclosures@trendmicro.com

Affected SoftwareAffected VersionHow to fix
Zohocorp Manageengine Adselfservice Plus=6.1-6122
ManageEngine ADSelfService Plus

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Frequently Asked Questions

  • What is CVE-2023-35719?

    CVE-2023-35719 is a vulnerability in ManageEngine ADSelfService Plus GINA Client that allows physically present attackers to execute arbitrary code.

  • How does the ManageEngine ADSelfService Plus GINA Client vulnerability work?

    The vulnerability occurs due to insufficient verification of data authenticity, which bypasses the authentication process and allows arbitrary code execution.

  • What is the severity of CVE-2023-35719?

    The severity of CVE-2023-35719 is medium, with a severity value of 6.8.

  • How can I fix the ManageEngine ADSelfService Plus GINA Client vulnerability?

    To fix the vulnerability, apply the necessary patches or updates provided by ManageEngine.

  • Where can I find more information about CVE-2023-35719?

    You can find more information about CVE-2023-35719 at the following references: [link 1], [link 2], [link 3].

Contact

SecAlerts Pty Ltd.
132 Wickham Terrace
Fortitude Valley,
QLD 4006, Australia
info@secalerts.co
By using SecAlerts services, you agree to our services end-user license agreement. This website is safeguarded by reCAPTCHA and governed by the Google Privacy Policy and Terms of Service. All names, logos, and brands of products are owned by their respective owners, and any usage of these names, logos, and brands for identification purposes only does not imply endorsement. If you possess any content that requires removal, please get in touch with us.
© 2024 SecAlerts Pty Ltd.
ABN: 70 645 966 203, ACN: 645 966 203