=============================================================================== CSRF/Stored XSS Vulnerability in Manage Engine Asset Explorer =============================================================================== . contents:: Table Of Content Overview ======== * Title :CSRF/Stored XSS vulnerability in Manage Engine Asset Explorer * Author: Kaustubh G. Padwad * Plugin Homepage: https://www.manageengine.com/products/asset-explorer/ * Severity: HIGH * Version Affected: Version 6.1.0 Build: 6110 * Version Tested : Version 6.1.0 Build: 6110 * version patched: * CVE ID : Description =========== Vulnerable Parameter -------------------- * Too many parameters (All Device properties) About Vulnerability ------------------- This Product is vulnerable to a combination of CSRF/XSS attack meaning that if an admin user can be tricked to visit a crafted URL created by attacker (via spear phishing/social engineering), the attacker can execute arbitrary code into Asset list(AssetListView.do). Once exploited, admin’s browser can be made to do almost anything the admin user could typically do by hijacking admin's cookies etc. Vulnerability Class =================== Cross Site Request Forgery (https://www.owasp.org/index.php/Cross-Site_Request_Forgery_%28CSRF%29) Cross Site Scripting (https://www.owasp.org/index.php/Top_10_2013-A3-Cross-Site_Scripting_(XSS) Steps to Reproduce: (POC) ========================= * Add follwing code to webserver and send that malicious link to application Admin. * The admin should be loggedin when he clicks on the link. * Soical enginering might help here For Example :- Device password has been changed click here to reset ####################CSRF COde#######################
Mitigation ========== Update to version 6.1 Change Log ========== https://www.manageengine.com/products/asset-explorer/sp-readme.html Disclosure ========== 30-March-2015 Reported to Developer 27-April-2015 Fixed By Vendor credits ======= * Kaustubh Padwad * Information Security Researcher * kingkaustubh@me.com * https://twitter.com/s3curityb3ast * http://breakthesec.com * https://www.linkedin.com/in/kaustubhpadwad