cve/2023/CVE-2023-6105.md

21 lines
1.2 KiB
Markdown
Raw Permalink Normal View History

2024-05-25 21:48:12 +02:00
### [CVE-2023-6105](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6105)
![](https://img.shields.io/static/v1?label=Product&message=Access%20Manager%20Plus&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=Asset%20Explorer&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=Service%20Desk%20Plus&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=0%3C%2014304%20&color=brighgreen)
![](https://img.shields.io/static/v1?label=Version&message=0%3C%207004%20&color=brighgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor&color=brighgreen)
### Description
An information disclosure vulnerability exists in multiple ManageEngine products that can result in encryption keys being exposed. A low-privileged OS user with access to the host where an affected ManageEngine product is installed can view and use the exposed key to decrypt product database passwords. This allows the user to access the ManageEngine product database.
### POC
#### Reference
- https://www.tenable.com/security/research/tra-2023-35
#### Github
No PoCs found on GitHub currently.