Title:ManageEngineServiceDeskPlusApplicationCompromiseDate:19May2017Researcher:StevenLackey(ByteM3)Product:ServiceDeskPlus(http://www.manageengine.com/)AffectedVersion:9.0(Other versions could also be affected)FixedVersion:ServicePack9241 – Build9.2VulnerabilityImpact:HighPublishedDate:Email: bytem3 [at] bytem3.com <http://cyberdefensetechnologies.com/>ProductIntroduction===============ServiceDeskPlus is ITIL-ready help desk software withintegratedAssetandProjectManagementcapabilities.
With advanced ITSM functionality and easy-to-use capability,ServiceDeskPlus helps IT support teams deliver
world-class service toend users withreduced costs and complexity. It
comes in three editions and is available
in 29 different languages. Over100,000 organizations, across 185
countries, trust ServiceDeskPlustooptimizeIT service desk performance and achieve high end user satisfaction.
Source: https://www.manageengine.com/products/service-desk/VulnerabilityInformation==================Class:BackdoorImpact:Account and ApplicationCompromiseRemotelyExploitable:YesAuthenticationRequired:YesUser interaction required:YesCVEName:N/AVulnerabilityDescription===================A valid username can be used as both username/password tologin and
compromise the application through the “/mc/” directory which is the
‘mobile client’ directory. This can be achieved ONLYifActiveDirectory/LDAP is being used.
This flaw exists because of the lack of password randomization in the
application version 9.0 when a user is entered into the application, thus
the application assigns the password as the username. The flaw can then be
exploited by logging into the application through the “/mc” directory and
then backing out of the “/mc” directory by deleting it from the URL thus
positioning you in the main application withthe authority of the user you
logged in as.(Help locating a valid username can come from another
discovered vulnerability in this same version of software here:
https://www.exploit-db.com/exploits/35891/-withcredittoMuhammadAhmedSiddiquifor discovering how toenumerate usernames)Proof-of-ConceptAuthenticatedUser============================An attacker can use the following URLtologintothe mobile client withany workstation:
http://server/mc/Use the discovered username in both the username and password fields.
Ensure the “IsADAuth” box is checked and click login.
Once logged in, remove “/mc/” from the URL and you will be presented withthe full application and the authorities of the user you just logged in
with.
You can now continuetolookfor usernames inside the application until a
user withadministrative privileges has been discovered and can compromise
withadministrativeauthority. Please note,ServiceDeskPlus has the
ability to ‘scan’ machines on any available network it can see, meaning,
system accounts are typically entered into the application tokeep an
inventory of machines that ServiceDesk can manage. It is possible tocompromise not only the hosting machine forthis application, however, the
entire network as I did on the PenetrationTest where I discovered this
‘backdoor’.VendorResponse=======I have contacted the vendor and they advised they have fixed this
particular issue withanew service pack ‘9241’, however,this insanely
vulnerability is still out there, as this scenario has not been published
as of yet, other than the vendors statement on their 9.2Release readme
webpage (https://www.manageengine.com/products/service-desk/readme-9.2.html)
and email tome here:
“FIX:PATCH*SD-61664:*Based on Database configuration, an option toset
the LocalAuthentication password as Random or predefined,for the users
added through ActiveDirectory(AD),LDAP,Dynamic user addition, users
created via e-mail Requests has been provided. Make sure that the
notification under Admin>>NotificationRules>>SendSelf-service login
details is enabled before performing the importso that LA user details
will be notified tousers through email.”
Timeline=======18-Apr-2017 – NotificationtoVendor19-Apr-2017 – Response from Vendor31-Jan-2017 – Vulnerability fixed by Vendor19-May-2017 – Still no clear publication on this backdoor