# ExploitTitle:ManageEngineADSelfServicePlus6000 – UnauthenticatedRemoteCodeExecution
# Date:2020-08-08
# ExploitAuthor:BhadreshPatel
# Vendor link: https://www.manageengine.com/company.html
# Version:ADSelfServicePlus build <6003
# CVE:CVE-2020-11552This is an article withPoC exploit video of ManageEngineADSelfServicePlus – UnauthenticatedRemoteCodeExecutionVulnerability-------------------------------------------------------------------------------------------------------------------------------------------------------------------------------Title:====ManageEngineADSelfServicePlus – UnauthenticatedRemoteCodeExecutionVulnerabilityCVEID:=======CVE-2020-11552Date:====08/08/2020(dd/mm/yyyy)Vendor:======As the IT management division of ZohoCorporation,ManageEngine prioritizes
flexible solutions that work for all businesses, regardless of size or
budget.
ManageEngine crafts comprehensive IT management software witha focus on
making your job easier. Our90+ products and free tools cover everything
your IT needs, at prices you can afford.
From network and device management tosecurity and service desk software,
we're bringing IT together for an integrated, overarching approach tooptimize your IT.
Vendor link: https://www.manageengine.com/company.html
VulnerableProduct:==============ManageEngineADSelfServicePlus is an integrated self-service password
management and single sign on solution. This solution helps domain users
perform self-service password reset, self-service account unlock, employee
self-update of personal details (e.g., mobile numbers and photos) in
MicrosoftWindowsActiveDirectory. ADSelfServicePlus also providesuserswithsecure, one-click access toallSAML-supported enterprise
applications, including Office365,Salesforce, and GSuite, through ActiveDirectory-based single sign-on (SSO).For improved security,ADSelfServicePlus offers Windows two-factor authentication for all remote and local
logins. Administrators find it easy toautomate password resets, account
unlocks while optimizing IT expenses associated withhelp desk calls.
Product link:
https://www.manageengine.com/products/self-service-password/?meadsol
Abstract:=======A remote code execution vulnerability exists in ManageEngineADSelfServicePlusSoftware when it does not properly enforce user privileges associated
withWindowsCertificateDialog.
This vulnerability could allow an unauthenticated attacker toremotely
execute commands withsystem level privileges on target windows host. An
attacker does not require any privilege on the target system in order toexploitthisvulnerability.
Report-Timeline:=============27/02/2020:Vendor notified
27/02/2020:Vendor response
28/02/2020:Marked duplicate
11/03/2020:Patch released
23/03/2020:Vendor responded regarding patch release update
26/03/2020:Patch tested and found that it partially fixed the issue.
Reported back tothe vendor.18/04/2020:Shared updated report withnewPoC22/04/2020:Vendor acknowledged the issue
24/07/2020:Patch released (
https://pitstop.manageengine.com/portal/en/community/topic/adselfservice-plus-6003-release-faceid-support
)08/08/2020:Public disclosure
AffectedSoftwareVersion:=============<ADSelfServicePlus build 6003Exploitation-Technique:===================RemoteSeverityRating(CVSS):===================9.8(Critical)(CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H)Details:=======A remote code execution vulnerability exists in ManageEngineADSelfServicePlusSoftware when it does not properly enforce user privileges associated
withWindowsCertificateDialog.
This vulnerability could allow an unauthenticated attacker toremotely
execute commands withsystem level privileges on target windows host. An
attacker does not require any privilege on the target system in order toexploitthisvulnerability.
ManageEngineADSelfServicePlus thick client enables a user toperform
self-service like password reset, self-service account unlock, etc by using
self-service option on windows login screen.
Upon selecting this option,ManageEngineADSelfServicePlus thick client
software will be launched which will connect toa remote ADSelfServicePlus
server tofacilitate the self-service operations.
A security alert can/will be triggered when “an unauthenticated attacker
having physical access tothe host issues a self-signed SSL certificate tothe client”.Or, “a (default) self-signed SSL certificate is configured on
ADSelfServicePlus server”.
“ViewCertificate” option from the security alert will allow an attacker
withphysical access or a remote attacker withRDP access,toexport a
displayed certificate toafile. This will further cascade tothe standard
dialog/wizard which will openfile explorer as SYSTEM.
By navigating file explorer through “C:\windows\system32\”, a cmd.exe can
be launched as a SYSTEM.*PoCVideo:* https://www.youtube.com/watch?v=slZRXffswnQ
01:00to05:30:Setup the environment
05:30to06:34:ExploitationCredits:=======BhadreshPatel-------------------------------------------------------------------------------------------------------------------------------------------------------------------------------Regards,-Bhadresh