This vulnerability allows remote attackers to disclose sensitive information on affected installations of ManageEngine OpManager. Authentication is not required to exploit this vulnerability. The specific flaw exists within the OpmSkipFilter class. The issue results from the lack of proper validation of a user-supplied path prior to using it in file operations. An attacker can leverage this vulnerability to disclose files in the context of the service account.
Affected Software | Affected Version | How to fix |
---|---|---|
ManageEngine OpManager |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
ZDI-CAN-11127 has a high severity level due to its potential for unauthorized sensitive information disclosure.
To fix ZDI-CAN-11127, ensure that you apply the latest security patches provided by ManageEngine for OpManager.
ZDI-CAN-11127 can lead to the exposure of sensitive information that could be exploited by attackers.
No, ZDI-CAN-11127 can be exploited without requiring authentication.
ZDI-CAN-11127 affects certain installations of ManageEngine OpManager, details of which can be found in the advisory.