.. / CVE-2022-47966

Exploit for ManageEngine - Remote Command Execution (CVE-2022-47966)

Description:

Multiple Zoho ManageEngine on-premise products, such as ServiceDesk Plus through 14003, allow remote code execution due to use of Apache xmlsec (aka XML Security for Java) 1.4.1, because the xmlsec XSLT features, by design in that version, make the application responsible for certain security protections, and the ManageEngine applications did not provide those protections.

Proof of Concept

PoC exploit

Nuclei Template

View the template here CVE-2022-47966.yaml

Validate with Nuclei

echo "$URL" | nuclei -t ~/nuclei-templates/http/cves/2022/CVE-2022-47966.yaml
Copy

Try the exploit in a lab environment:

Lab Machine Link
Hack The Box Cerberus Go to Practice

References:

https://www.horizon3.ai/manageengine-cve-2022-47966-technical-deep-dive/
https://www.manageengine.com/security/advisory/CVE/cve-2022-47966.html
https://twitter.com/horizon3attack/status/1616062915097886732?s=46&t=ER_is9G4FlEebVFQPpnM0Q
http://packetstormsecurity.com/files/170882/Zoho-ManageEngine-ServiceDesk-Plus-14003-Remote-Code-Execution.html
https://nvd.nist.gov/vuln/detail/CVE-2022-47966