<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Cpe:2.3:a:zohocorp:manageengine_applications_manager:14.0:build14120:*:*:*:*:*:* — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/cpes/cpe2.3azohocorpmanageengine_applications_manager14.0build14120/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata. Fed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Wed, 03 Jan 2024 12:00:00 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/cpes/cpe2.3azohocorpmanageengine_applications_manager14.0build14120/feed.xml" rel="self" type="application/rss+xml"/><item><title>ManageEngine Applications Manager Authenticated RCE via File Upload (CVE-2020-14008)</title><link>https://feed.craftedsignal.io/briefs/2024-01-manageengine-rce/</link><pubDate>Wed, 03 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-manageengine-rce/</guid><description>CVE-2020-14008 is an unrestricted file upload vulnerability in Zoho ManageEngine Applications Manager that allows an authenticated attacker to upload a malicious JAR file containing a reverse shell to achieve remote code execution.</description><content:encoded><![CDATA[<p>An authenticated remote code execution vulnerability exists in Zoho ManageEngine Applications Manager due to an unrestricted file upload (CVE-2020-14008). Successful exploitation allows attackers to execute arbitrary code on the system. The exploit involves authenticating to the application, identifying the installation directory, crafting a malicious Java class within a JAR file, uploading the JAR to a specific directory via directory traversal, and then triggering the execution of the uploaded code through the Weblogic credential test. Default credentials of &ldquo;admin:admin&rdquo;, &ldquo;admin:password&rdquo;, &ldquo;administrator:administrator&rdquo;, and &ldquo;guest:guest&rdquo; may be leveraged to gain unauthorized access. This vulnerability affects multiple versions of ManageEngine Applications Manager.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Authenticate to ManageEngine Applications Manager using valid credentials (e.g., default credentials) to obtain a session cookie.</li>
<li>Enumerate the ManageEngine base installation directory.</li>
<li>Create a malicious Java class (e.g., <code>weblogic.jndi.Environment</code>) containing a reverse shell.</li>
<li>Compile the Java class into a JAR file (e.g., <code>weblogic.jar</code>) using <code>javac</code> and <code>jar</code>.</li>
<li>Upload the malicious JAR file to the <code>classes/weblogic/version8/</code> directory using directory traversal techniques. As a fallback, create a scheduled task to move the file.</li>
<li>Trigger the Weblogic credential test at the <code>/testCredential.do</code> endpoint.</li>
<li>The application loads and instantiates the malicious Java class.</li>
<li>The reverse shell within the JAR connects back to the attacker&rsquo;s listener, granting remote code execution.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation allows the attacker to execute arbitrary code on the affected system, potentially leading to complete system compromise, data theft, and disruption of services. Organizations using ManageEngine Applications Manager are at risk. The exploitation could lead to lateral movement within the network and further compromise of sensitive data.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Apply the security updates provided by ManageEngine to patch CVE-2020-14008 as detailed in the ManageEngine Advisory.</li>
<li>Deploy the Sigma rule for detecting JAR file uploads to the webserver log and tune for your environment.</li>
<li>Monitor process creation events for Java processes executing from the <code>classes/weblogic/version8/</code> directory, using the provided Sigma rule.</li>
<li>Enforce strong password policies and regularly audit user accounts to prevent the use of default credentials, as mentioned in the overview.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>rce</category><category>file upload</category><category>manageengine</category></item></channel></rss>