ID CVE-2015-7765
Summary ZOHO ManageEngine OpManager 11.5 build 11600 and earlier uses a hardcoded password of "plugin" for the IntegrationUser account, which allows remote authenticated users to obtain administrator access by leveraging knowledge of this password. <a href="http://cwe.mitre.org/data/definitions/798.html" target="_blank">CWE-798: Use of Hard-coded Credentials</a>
References
Vulnerable Configurations
  • cpe:2.3:a:zohocorp:manageengine_opmanager:11.5:*:*:*:*:*:*:*
    cpe:2.3:a:zohocorp:manageengine_opmanager:11.5:*:*:*:*:*:*:*
CVSS
Base: 9.0 (as of 09-10-2015 - 17:42)
Impact:
Exploitability:
CWE NVD-CWE-Other
CAPEC
Access
VectorComplexityAuthentication
NETWORK LOW SINGLE
Impact
ConfidentialityIntegrityAvailability
COMPLETE COMPLETE COMPLETE
cvss-vector via4 AV:N/AC:L/Au:S/C:C/I:C/A:C
d2sec via4
name ManageEngine OpManager SQL Injection
url http://www.d2sec.com/exploits/manageengine_opmanager_sql_injection.html
refmap via4
confirm https://support.zoho.com/portal/manageengine/helpcenter/articles/pgsql-submitquery-do-vulnerability
exploit-db 38221
fulldisc 20150915 ManageEngine OpManager multiple vulnerabilities
misc
Last major update 09-10-2015 - 17:42
Published 09-10-2015 - 14:59
Last modified 09-10-2015 - 17:42
Back to Top