vendor:
Desktop Central / Desktop Central MSP
by:
Pedro Ribeiro
9,8
CVSS
CRITICAL
Remote code execution as SYSTEM via file upload
264
CWE
Product Name: Desktop Central / Desktop Central MSP
Affected Version From: v7
Affected Version To: v9 build 90054
Patch Exists: YES
Related CWE: CVE-2014-5005, CVE-2014-5006, CVE-2014-5007
CPE: o:manageengine:desktop_central
Metasploit:
N/A
Other Scripts:
N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References:
N/A
Nuclei Metadata: N/A
Platforms Tested: Windows
2014
Arbitrary file upload / remote code execution in ManageEngine Desktop Central / Desktop Central MSP
There are several vulnerable servers are out there if you know the Google dorks. Quoting the author of the Internet Census 2012: 'As a rule of thumb, if you believe that 'nobody would connect that to the Internet, really nobody', there are at least 1000 people who did.' These vulnerabilities can be abused to achieve remote code execution as SYSTEM in Windows. I've updated the desktopcentral_file_upload Metasploit module to use the new statusUpdate technique. Needless to say, owning a Desktop Central box will give you control of all the computers and smartphones it manages.
Mitigation:
Upgrade to DC v9 build 90055