ManageEngine ServiceDesk Plus User Enumeration Vulnerability

Friday, January 23, 2015

[REWTERZ-20140102] – Rewterz – Security Advisory

Title: ManageEngine ServiceDesk Plus User Enumeration Vulnerability
Product: ServiceDesk Plus (http://www.manageengine.com/)
Affected Version: 9.0 (Other versions could also be affected)
Fixed Version: 9.0 Build 9031
Vulnerability Impact: Low
Advisory ID: REWTERZ-20140102
Published Date: 22-Jan-2015
Researcher: Muhammad Ahmed Siddiqui
Email: ahmed [at] rewterz.com
URL: http://www.rewterz.com/vulnerabilities/manageengine-servicedesk-plus-user-enumeration-vulnerability

 

Product Introduction

ServiceDesk Plus is a help desk software with integrated asset and project management built on the ITIL framework. It is available in 29 different languages and is used by more than 85,000 companies, across 186 countries, to manage their IT help desk and assets.

Source: http://www.manageengine.com/products/service-desk/

 

Vulnerability Information

Class: User Name Enumeration
Impact: An unauthenticated and authenticated user can enumerate users
Remotely Exploitable: Yes
Authentication Required: Yes
User interaction required: Yes
CVE Name: N/A

 

Vulnerability Description

An unauthenticated and authenticated user can enumerate all the users and domains on the system by sending a simple request to URL.

Proof-of-Concept Authenticated User

An attacker can use the following URL to enumerate users and domains by accessing the following URL:

http:// 127.0.0.1:8080/servlet/AJaxServlet?action=checkUser&search=guest

Response if User is valid:

{ USER_PRESENT: ‘true’, IN_SITE: ‘true’ }

Response if User is invalid:

{ USER_PRESENT: ‘false’, ADD_REQUESTER: ‘false’ }

 

Proof-of-Concept Unauthenticated User

An attacker can use the following URL to enumerate users and domains by accessing the following URL:

http://127.0.0.1:8080/domainServlet/AJaxDomainServlet?action=searchLocalAuthDomain&search=100101

If the user in the Search Parameter is found the response will contain the domain name in which that particular user exists.

 

Timeline

23-Dec-2014 – Notification to Vendor
24-Dec-2014 – Response from Vendor
30-Dec-2014 – Vulnerability fixed by Vendor

Data Sheets

Corporate Brochure


Our Story


Services


Solutions


Managed Security


Upcoming Rewterz Trainings/Events

Rewterz News

  • 25, May 2015 Rewterz Releases Jan-Apr 2015 Threat Intelligence Report on Attacks Targeting Pakistan’s Cyber Space
  • 18, October 2014 Rewterz Threat Advisory – SSL 3.0 Protocol Vulnerability and POODLE Attack
  • 25, September 2014 Rewterz Threat Advisory – ‘Shellshock’ Vulnerability in Bash
  • 17, September 2014 Rewterz Releases August’s Threat Intelligence Report on Attacks Targeting Pakistan’s Cyber Space

Copyright © Rewterz. All rights reserved.