CVE-2021-37415 Scanner
CVE-2021-37415 Scanner - Authentication Bypass vulnerability in Zoho ManageEngine ServiceDesk Plus
Short Info
Level
Single Scan
Single Scan
Can be used by
Asset Owner
Estimated Time
10 seconds
Time Interval
24 days 15 hours
Scan only one
Domain, Subdomain, IPv4
Toolbox
Zoho ManageEngine ServiceDesk Plus is a comprehensive IT help desk and asset management software widely used by IT departments in small to large enterprises for ticketing and resource allocation. It provides robust IT service management capabilities, including incident management, problem management, and change management. Organizations use it to streamline IT support functions and manage their IT assets efficiently. The software is typically deployed within corporate intranets and tailored to an organization's specific processes and workflows. As part of Zoho's suite of cloud software, it integrates with other Zoho applications for broader organizational utility. Companies rely on it to ensure seamless communication and problem-solving within their IT teams.
The Authentication Bypass vulnerability in Zoho ManageEngine ServiceDesk Plus allows unauthorized users to access critical REST-API endpoints without needing to authenticate. This flaw permits manipulation of the authentication process, circumventing security protocols designed to protect sensitive data and functionalities. Attackers exploiting this vulnerability can execute arbitrary commands or extract sensitive information. It poses a significant risk as it entails unauthorized actions that could compromise data integrity and confidentiality. This vulnerability is severe due to its potential to facilitate further exploits if additional security layers are not in place. It highlights the importance of robust authentication mechanisms in software applications.
The vulnerability arises from inadequate session management and insufficient validation of authentication tokens on certain API endpoints. Specifically, the endpoints using REST-API URLs are accessible without requiring authentication checks. The API endpoint '/api/v3/{{randbase(8)}}/../announcements' in particular is involved, expecting certain parameters but failing to ensure proper user authentication. The application's response can leak sensitive indicators confirming access to data without authorization, as shown by the presence of specific JSON attributes. These inadequately protected endpoints are exploited by attackers to bypass authentication layers, revealing confidential information. Such configurations are particularly vulnerable when exposed to public networks.
When exploited, this vulnerability can lead to unauthorized access to sensitive data and functionalities, significantly affecting an organization's data security. Attackers could perform malicious activities such as data theft, unauthorized changes to the system, or further attacks on linked systems. This might compromise customer data, financial information, or operational integrity. The compromised system may act as a foothold for escalating privileges or executing broader attacks on the infrastructure. Ultimately, this could lead to downtime, significant financial loss, and reputational damage.
REFERENCES