Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2019-10008 PoC — ZOHO ManageEngine ServiceDesk Plus 授权问题漏洞

Source
Associated Vulnerability
Title:ZOHO ManageEngine ServiceDesk Plus 授权问题漏洞 (CVE-2019-10008)
Description:ZOHO ManageEngine ServiceDesk Plus(SDP)是美国卓豪(ZOHO)公司的一套基于ITIL架构的IT服务管理软件。该软件集成了事件管理、问题管理、资产管理IT项目管理、采购与合同管理等功能模块。 ZOHO ManageEngine SDP 9.3版本中存在安全漏洞。攻击者可利用该漏洞枚举用户。
Description
ManageEngine Service Desk Plus 10.0 Privilaged account Hijacking
Readme
# CVE-2019-10008
## ManageEngine Service Desk Plus 9.3 Privilaged account Hijacking

**Date: 30-03-2019**

**Exploit Author: Ata Hakçıl, Melih Kaan Yıldız**

**Vendor: ManageEngine**

**Vendor Homepage: www.manageengine.com**

**Product: Service Desk Plus**

**Version: 10.0**

**Tested On: Windows 10 64 bit**

**CVE : 2019-10008**

# Complete Poc will be re-released after vendor patch.

## More Info: 
https://flameofignis.com/en/vuln/CVE-2019-10008

https://www.youtube.com/watch?v=fCea6yRkkSQ

## Details
A security vulnerability was discovered on Service Desk Plus 9.3
It is caused by how session cookies are handled, and causes an attacker with any valid credentials to authenticate as another user without password.

### How to use
Change the host, low_username, low_password and high_username variables depending on what you have.
Low username and password is an account you have access to. high_username is account you want to authenticate as.

After running the script, it will output you the cookies that you can set on your browser to login to the high_username without password.
**Run this script on a Linux OS.**
File Snapshot

[4.0K] /data/pocs/997d9989929165173b6f48102a44513e35402d4b ├── [6.9K] exploit.py └── [1.1K] README.md 0 directories, 2 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.