vendor:
Support Center Plus
by:
Robert 'xistence' van Hamburg
7.5
CVSS
HIGH
Directory Traversal
22
CWE
Product Name: Support Center Plus
Affected Version From: 7.8 build <= 7801
Affected Version To: 7.8 build <= 7801
Patch Exists: YES
Related CWE: N/A
CPE: a:manageengine:support_center_plus:7.8
Metasploit:
N/A
Other Scripts:
N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References:
N/A
Nuclei Metadata: N/A
Platforms Tested: Linux & Windows
2020
ManageEngine Support Center Plus 7.8 build <= 7801 Directory Traversal Vulnerability
It's possible to access all local files on the server and because Support Center Plus runs as root/Administrator by default it's possible to access files owned by superusers too. This for example makes it possible to grab for the "/etc/shadow" file on a linux box. An authenticated user on the helpdesk is not needed, so any attacker can exploit this vulnerability without credentials.
Mitigation:
Ensure that the application is not running as root/Administrator and that the application is not accessible from the internet.