Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2018-5353 PoC — ZOHO ManageEngine ADSelfService Plus 安全漏洞

Source
Associated Vulnerability
Title:ZOHO ManageEngine ADSelfService Plus 安全漏洞 (CVE-2018-5353)
Description:ZOHO zoho manageengine adselfservice plus是美国卓豪(ZOHO)公司的一套基于Web的终端用户密码管理软件。 Zoho ManageEngine ADSelfService Plus 5.5 build 5517之前版本 GINA/CP模块存在安全漏洞,该漏洞源于允许远程攻击者通过欺骗来执行代码和升级特权。在打开浏览器窗口之前,它不会对预期的服务器进行身份验证。能够执行欺骗攻击的未经身份验证的攻击者可以重定向浏览器以在winlogin .exe进程上下文中执行。如果
Description
CVE-2018-5353
Readme
# CVE-2018-5353
# Zoho ManageEngine ADSelfServicePlus Client Privilege Escalation/RCE

## Information
**Vendor:** Zohocorp  
**Product:** ManageEngine ADSelfServicePlus  
**Versions Affected:** Before 5.5 build 5517  
**Researcher:** Jason Juntunen aka @missing0x00 (https://github.com/missing0x00)  
**CVSS:** 8.8  

## Description
The custom GINA/CP module in Zoho ManageEngine ADSelfService Plus before 5.5 build 5517 allows remote attackers to execute code and escalate privileges via spoofing.
It does not authenticate the intended server before opening a browser window. An unauthenticated attacker capable of conducting a spoofing attack can redirect the browser to gain execution in the context of the WinLogon.exe process. If Network Level Authentication is not enforced, the vulnerability can be exploited via RDP.
Additionally, if the web server has a misconfigured certificate then no spoofing attack is required.

### Proof of Concept
1. Conduct spoofing attack using any available method (ARP, physical access, etc.), redirecting traffic intended for the intended ADSSP server
2. Run web server on attacking host, serving binary junk file named AgentStatusUpdate.cc
3. RDP to target host (if NLA is not enforced - otherwise this attack requires physical access)
4. Click "Reset Password" link or tile on logon screen
5. Built-in client browser will be redirected to web server on attacking host, opening File Download dialog
6. Click Save, opening File Explorer dialog
7. Shift+Right-Click > "Open command window here"

[![YouTube Video CVE-2018-5353 PoC](https://img.youtube.com/vi/xrXCU6bW6Ko/0.jpg)](https://www.youtube.com/watch?v=xrXCU6bW6Ko)

![Exploit flow chart](ADSSP-PoC-Diagram.png)

### Remediation
Update the client software on all affected devices. This vulnerability was fixed in the client software included in build 5517 (April 17, 2018).

## References
**Vendor ID:** ZVE-2018-0058  
**Vendor Link:** https://www.manageengine.com/products/self-service-password/release-notes.html   
**Disclosure Link:** https://github.com/missing0x00/CVE-2018-5353  
**NIST CVE Link:** https://nvd.nist.gov/vuln/detail/CVE-2018-5353  
**CVSS Calculation:** https://nvd.nist.gov/vuln-metrics/cvss/v3-calculator?vector=AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H  

## Disclaimer
The information contained within this advisory is supplied "as-is" with no warranties or guarantees of fitness of use or otherwise. Permission is hereby granted for the redistribution of this advisory, provided that it is not altered except by reformatting it, and that due credit is given. Permission is explicitly given for insertion in vulnerability databases and similar, provided that due credit is given to the author. The author is not responsible for any misuse of the information contained herein and accepts no responsibility for any damage caused by the use or misuse of this information. The author prohibits any malicious use of security related information or exploits by the author or elsewhere.

missingnull
File Snapshot

[4.0K] /data/pocs/d541f48c4bac5bbdb69de3965e8e6f4e4a803aa9 ├── [100K] ADSSP-PoC-Diagram.png └── [2.9K] README.md 0 directories, 2 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.