RULE(RULE ID:322892)

Rule General Information
Release Date: 2019-08-15
Rule Name: Zoho ManageEngine Applications Manager 13.5 - Command Injection Vulnerability (CVE-2018-7890)
Severity:
CVE ID:
Rule Protection Details
Description: A remote code execution issue was discovered in Zoho ManageEngine Applications Manager before 13.6 (build 13640). The publicly accessible testCredential.do endpoint takes multiple user inputs and validates supplied credentials by accessing a specified system. This endpoint calls several internal classes, and then executes a PowerShell script. If the specified system is OfficeSharePointServer, then the username and password parameters to this script are not validated, leading to Command Injection.
Impact: An attacker can execute arbitrary command via a successful exploit in the context of the vulnerable software.
Affected OS: Windows, Others
Reference: SecurityFocusBID:103358
ExploitDB:44274
https://github.com/rapid7/metasploit-framework/pull/9684
https://pentest.blog/advisory-manageengine-applications-manager-remote-code-execution-sqli-and/
Solutions
The vendors have released upgrade patches to fix vulnerabilities, please visit:
https://www.manageengine.com/