fkie_cve-2020-28653
Vulnerability from fkie_nvd
Published
2021-02-03 16:15
Modified
2024-11-21 05:23
Severity ?
Summary
Zoho ManageEngine OpManager Stable build before 125203 (and Released build before 125233) allows Remote Code Execution via the Smart Update Manager (SUM) servlet.
References
▼ | URL | Tags | |
---|---|---|---|
cve@mitre.org | http://packetstormsecurity.com/files/164231/ManageEngine-OpManager-SumPDU-Java-Deserialization.html | Exploit, Third Party Advisory, VDB Entry | |
cve@mitre.org | https://www.manageengine.com/network-monitoring/help/read-me-complete.html#125203 | Release Notes, Vendor Advisory | |
cve@mitre.org | https://www.manageengine.com/network-monitoring/help/read-me-complete.html#125233 | Release Notes, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://packetstormsecurity.com/files/164231/ManageEngine-OpManager-SumPDU-Java-Deserialization.html | Exploit, Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.manageengine.com/network-monitoring/help/read-me-complete.html#125203 | Release Notes, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.manageengine.com/network-monitoring/help/read-me-complete.html#125233 | Release Notes, Vendor Advisory |
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:*:*:*:*:*:*:*:*", "matchCriteriaId": "0026FC79-6554-4B68-89EB-D7A8422C7406", "versionEndExcluding": "12.5", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125000:*:*:*:*:*:*", "matchCriteriaId": "94F878CC-E691-41E9-A90D-72EA25038963", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125002:*:*:*:*:*:*", "matchCriteriaId": "6D1EA156-BD95-4AAA-B688-0CD62CCDB60A", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125100:*:*:*:*:*:*", "matchCriteriaId": "8033E51C-D261-4A12-96CD-AE1F13BFD2AE", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125101:*:*:*:*:*:*", "matchCriteriaId": "9EE1E1E6-ED1C-443A-A576-AD47D65082B1", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125102:*:*:*:*:*:*", "matchCriteriaId": "3E283214-CE6A-4CD6-9E9B-7BF09C37447D", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125108:*:*:*:*:*:*", "matchCriteriaId": "8FF84A5E-C43B-4637-B725-1087D2057EED", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125110:*:*:*:*:*:*", "matchCriteriaId": "25AEF257-E1C1-4DFD-9EC0-9B2AC3920CCD", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125111:*:*:*:*:*:*", "matchCriteriaId": "46E32091-F91D-4706-A4F9-DC658CF36A6D", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125112:*:*:*:*:*:*", "matchCriteriaId": "AC7D1106-6708-4A84-A077-286376C72AB7", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125113:*:*:*:*:*:*", "matchCriteriaId": "071B3368-D7C2-4EE1-808F-1F4A3C3A4756", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125114:*:*:*:*:*:*", "matchCriteriaId": "4E9D5882-91D6-4E9D-AD8B-F3861D987826", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125116:*:*:*:*:*:*", "matchCriteriaId": "17931D40-369C-430F-B5ED-FAF69FAA0E3F", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125117:*:*:*:*:*:*", "matchCriteriaId": "02B4D022-BC43-4041-BA2B-60A6D42AD150", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125118:*:*:*:*:*:*", "matchCriteriaId": "15FFD3F7-CB9F-4FB1-9F2C-CFDAE7E46FF4", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125120:*:*:*:*:*:*", "matchCriteriaId": "5ED17849-BC14-4996-9DF9-7645B1E17374", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125121:*:*:*:*:*:*", "matchCriteriaId": "D91F6CC5-EDBE-420F-8871-03B8D10254B2", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125123:*:*:*:*:*:*", "matchCriteriaId": "E82C682C-9F61-45B7-B934-8D6DDBA792AC", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125124:*:*:*:*:*:*", "matchCriteriaId": "2FC7728B-9FFC-4A8F-BE24-926B8C2823AE", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125125:*:*:*:*:*:*", "matchCriteriaId": "78BE6CCE-706E-436B-A6E6-26E7D044B209", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125136:*:*:*:*:*:*", "matchCriteriaId": "8BD54A67-C531-4642-90D4-C6E402D55AC6", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125137:*:*:*:*:*:*", "matchCriteriaId": "9DF164BD-EF39-42E2-807D-F298D68A8D3D", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125139:*:*:*:*:*:*", "matchCriteriaId": "5D85766D-1BAC-4477-96D6-EA989D392128", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125140:*:*:*:*:*:*", "matchCriteriaId": "CE99520F-C8F3-46EA-9BBA-AAE2AB4AB8CA", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125143:*:*:*:*:*:*", "matchCriteriaId": "16D8A8F6-8BC3-438D-BF8B-9E2B46ECBF36", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125144:*:*:*:*:*:*", "matchCriteriaId": "F3D18E27-EE06-4555-A675-1BAC7D3DD8E8", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125145:*:*:*:*:*:*", "matchCriteriaId": "0FEFDFF7-5538-4C53-922A-A5E71A0D643E", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125156:*:*:*:*:*:*", "matchCriteriaId": "02463016-7156-470F-8535-EF4C7E150546", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125157:*:*:*:*:*:*", "matchCriteriaId": "8DEB616C-2DDC-4138-B6FC-8B2680D35485", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125158:*:*:*:*:*:*", "matchCriteriaId": "D51E7B22-9293-4086-B143-2D279597A5CC", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125159:*:*:*:*:*:*", "matchCriteriaId": "BB4D8585-6109-45C0-94B4-667D11F0509F", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125161:*:*:*:*:*:*", "matchCriteriaId": "97CB62BA-09FA-446D-A8CF-958980B67F13", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125163:*:*:*:*:*:*", "matchCriteriaId": "F871111C-4B61-4C50-ABDA-78D8D988DCD3", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125174:*:*:*:*:*:*", "matchCriteriaId": "9950CFB9-FCDE-4696-97AF-251467270375", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125175:*:*:*:*:*:*", "matchCriteriaId": "B674CFD8-6AE7-420A-BD7A-DD7A068CA5D0", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125176:*:*:*:*:*:*", "matchCriteriaId": "56BCA911-733C-4F8C-B3CD-22F3E6CA1F38", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125177:*:*:*:*:*:*", "matchCriteriaId": "A1281E75-AC6D-4077-9207-7CA7E5BCB1CF", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125178:*:*:*:*:*:*", "matchCriteriaId": "CC052CBA-2B37-4E84-978D-36185EE1A3A2", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125180:*:*:*:*:*:*", "matchCriteriaId": "72CC7428-8DD0-45DB-8D80-C02CD9B6CB65", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125181:*:*:*:*:*:*", "matchCriteriaId": "0C1691B0-FA38-4A29-8D49-D99A675C122A", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125192:*:*:*:*:*:*", "matchCriteriaId": "194ACE61-101D-40C3-9377-12039533AB45", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125193:*:*:*:*:*:*", "matchCriteriaId": "86428D44-03BC-4528-ADB5-3AC05231759D", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125194:*:*:*:*:*:*", "matchCriteriaId": "B694D0FC-320A-44F9-9FFB-0706CDD3004C", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125195:*:*:*:*:*:*", "matchCriteriaId": "BE298317-10EE-4A34-B4D0-8D03B727A75B", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125196:*:*:*:*:*:*", "matchCriteriaId": "B0A1B243-163D-461B-BEAB-81E6E2DB36EF", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125197:*:*:*:*:*:*", "matchCriteriaId": "5E86C3A0-700E-4CB2-AFDC-F203C61D413C", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125198:*:*:*:*:*:*", "matchCriteriaId": "A550184D-13BD-4F2A-9DE5-AC66B496FFC2", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125201:*:*:*:*:*:*", "matchCriteriaId": "538BCF38-69B6-4686-B1F1-82B10175CCBD", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125204:*:*:*:*:*:*", "matchCriteriaId": "F29A6AE3-B864-4552-9BE9-074CB6935B07", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125212:*:*:*:*:*:*", "matchCriteriaId": "7CD2AB8D-F638-48E0-A5D6-1E969F9998B4", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125213:*:*:*:*:*:*", "matchCriteriaId": "76528168-A54D-4398-B558-6DC27ACCBFBF", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125214:*:*:*:*:*:*", "matchCriteriaId": "6C1DCA3B-41B8-402B-B5E8-2C3494C36B77", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125215:*:*:*:*:*:*", "matchCriteriaId": "531A9E5C-9C45-4982-8ADE-5B41CE5F5B48", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125216:*:*:*:*:*:*", "matchCriteriaId": "FA70F031-A7EF-49F5-A1F6-C3DD33198D86", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125228:*:*:*:*:*:*", "matchCriteriaId": "5DF093BF-830B-4C9A-A4B2-41C7811E4EFA", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125229:*:*:*:*:*:*", "matchCriteriaId": "AB64E7D3-D835-4F46-BD81-6B59CF7EB9F6", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125230:*:*:*:*:*:*", "matchCriteriaId": "A2176672-0E34-4B46-9202-483F1D315836", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125231:*:*:*:*:*:*", "matchCriteriaId": "FBD2726E-4AAA-4E7D-A8E7-89DB875E7E6B", "vulnerable": true }, { "criteria": "cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125232:*:*:*:*:*:*", "matchCriteriaId": "94AF723B-F1B7-44A8-B654-7C10881A6AF8", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Zoho ManageEngine OpManager Stable build before 125203 (and Released build before 125233) allows Remote Code Execution via the Smart Update Manager (SUM) servlet." }, { "lang": "es", "value": "Zoho ManageEngine OpManager Stable build anterior a 125203 (y compilaci\u00f3n Publicada anterior a 125233) permite una ejecuci\u00f3n de c\u00f3digo remota por medio del servlet Smart Update Manager (SUM)" } ], "id": "CVE-2020-28653", "lastModified": "2024-11-21T05:23:06.663", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2021-02-03T16:15:13.557", "references": [ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory", "VDB Entry" ], "url": "http://packetstormsecurity.com/files/164231/ManageEngine-OpManager-SumPDU-Java-Deserialization.html" }, { "source": "cve@mitre.org", "tags": [ "Release Notes", "Vendor Advisory" ], "url": "https://www.manageengine.com/network-monitoring/help/read-me-complete.html#125203" }, { "source": "cve@mitre.org", "tags": [ "Release Notes", "Vendor Advisory" ], "url": "https://www.manageengine.com/network-monitoring/help/read-me-complete.html#125233" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory", "VDB Entry" ], "url": "http://packetstormsecurity.com/files/164231/ManageEngine-OpManager-SumPDU-Java-Deserialization.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Release Notes", "Vendor Advisory" ], "url": "https://www.manageengine.com/network-monitoring/help/read-me-complete.html#125203" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Release Notes", "Vendor Advisory" ], "url": "https://www.manageengine.com/network-monitoring/help/read-me-complete.html#125233" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-noinfo" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.