Vulnerabilities > CVE-2015-7765 - Hardcoded Password Information Disclosure vulnerability in Zohocorp Manageengine Opmanager 11.5
Attack vector
NETWORK Attack complexity
LOW Privileges required
SINGLE Confidentiality impact
COMPLETE Integrity impact
COMPLETE Availability impact
COMPLETE Summary
ZOHO ManageEngine OpManager 11.5 build 11600 and earlier uses a hardcoded password of "plugin" for the IntegrationUser account, which allows remote authenticated users to obtain administrator access by leveraging knowledge of this password. <a href="http://cwe.mitre.org/data/definitions/798.html" target="_blank">CWE-798: Use of Hard-coded Credentials</a>
Vulnerable Configurations
Part | Description | Count |
---|---|---|
Application | 1 |
D2sec
name | ManageEngine OpManager SQL Injection |
url | http://www.d2sec.com/exploits/manageengine_opmanager_sql_injection.html |
Exploit-Db
description | ManageEngine OpManager Remote Code Execution. CVE-2015-7765,CVE-2015-7766. Remote exploit for java platform |
file | exploits/java/remote/38221.rb |
id | EDB-ID:38221 |
last seen | 2016-02-04 |
modified | 2015-09-17 |
platform | java |
port | |
published | 2015-09-17 |
reporter | metasploit |
source | https://www.exploit-db.com/download/38221/ |
title | ManageEngine OpManager Remote Code Execution |
type | remote |
Metasploit
description | This module exploits a default credential vulnerability in ManageEngine OpManager, where a default hidden account "IntegrationUser" with administrator privileges exists. The account has a default password of "plugin" which cannot be reset through the user interface. By log-in and abusing the default administrator's SQL query functionality, it's possible to write a WAR payload to disk and trigger an automatic deployment of this payload. This module has been tested successfully on OpManager v11.0 and v11.4-v11.6 for Windows. |
id | MSF:EXPLOIT/WINDOWS/HTTP/MANAGE_ENGINE_OPMANAGER_RCE |
last seen | 2020-06-03 |
modified | 2018-09-15 |
published | 2015-09-16 |
references | |
reporter | Rapid7 |
source | https://github.com/rapid7/metasploit-framework/blob/master//modules/exploits/windows/http/manage_engine_opmanager_rce.rb |
title | ManageEngine OpManager Remote Code Execution |
Nessus
NASL family | CGI abuses |
NASL id | MANAGEENGINE_OPMANAGER_DEFAULT_CREDS.NASL |
description | The remote ManageEngine OpManager web administration interface uses a known set of hard-coded default credentials. An attacker can use these to gain administrative access to the remote host. |
last seen | 2020-06-01 |
modified | 2020-06-02 |
plugin id | 81380 |
published | 2015-02-16 |
reporter | This script is Copyright (C) 2015-2019 and is owned by Tenable, Inc. or an Affiliate thereof. |
source | https://www.tenable.com/plugins/nessus/81380 |
title | ManageEngine OpManager Default Credentials |
code |
|
References
- http://packetstormsecurity.com/files/133596/ManageEngine-OpManager-Remote-Code-Execution.html
- http://seclists.org/fulldisclosure/2015/Sep/66
- http://www.rapid7.com/db/modules/exploit/windows/http/manage_engine_opmanager_rce
- https://support.zoho.com/portal/manageengine/helpcenter/articles/pgsql-submitquery-do-vulnerability
- https://www.exploit-db.com/exploits/38221/