{ "id": "CVE-2016-9488", "sourceIdentifier": "cret@cert.org", "published": "2018-06-05T14:29:00.207", "lastModified": "2020-07-27T21:15:12.923", "vulnStatus": "Modified", "descriptions": [ { "lang": "en", "value": "ManageEngine Applications Manager versions 12 and 13 before build 13200 suffer from remote SQL injection vulnerabilities. An unauthenticated attacker is able to access the URL /servlet/MenuHandlerServlet, which is vulnerable to SQL injection. The attacker could extract users' password hashes, which are MD5 hashes without salt, and, depending on the database type and its configuration, could also execute operating system commands using SQL queries." }, { "lang": "es", "value": "ManageEngine Applications Manager en versiones 12 y 13 anteriores al build 13200 sufre de vulnerabilidades de inyecci\u00f3n SQL remota. Un atacante no autenticado puede acceder a la URL /servlet/MenuHandlerServlet, que es vulnerable a la inyecci\u00f3n SQL. El atacante puede extraer los hashes de las contrase\u00f1as de los usuarios, que son hashes MD5 sin sal y, dependiendo del tipo de base de datos y su configuraci\u00f3n, podr\u00eda tambi\u00e9n ejecutar comandos del sistema operativo usando consultas SQL." } ], "metrics": { "cvssMetricV30": [ { "source": "nvd@nist.gov", "type": "Primary", "cvssData": { "version": "3.0", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "NONE", "userInteraction": "NONE", "scope": "UNCHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL" }, "exploitabilityScore": 3.9, "impactScore": 5.9 } ], "cvssMetricV2": [ { "source": "nvd@nist.gov", "type": "Primary", "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "baseScore": 7.5 }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, "impactScore": 6.4, "acInsufInfo": false, "obtainAllPrivilege": false, "obtainUserPrivilege": false, "obtainOtherPrivilege": false, "userInteractionRequired": false } ] }, "weaknesses": [ { "source": "nvd@nist.gov", "type": "Primary", "description": [ { "lang": "en", "value": "CWE-89" } ] }, { "source": "cret@cert.org", "type": "Secondary", "description": [ { "lang": "en", "value": "CWE-89" } ] } ], "configurations": [ { "nodes": [ { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, "criteria": "cpe:2.3:a:manageengine:applications_manager:12.0:*:*:*:*:*:*:*", "matchCriteriaId": "9FA3D06B-0E69-4696-A47C-E859D76571E6" }, { "vulnerable": true, "criteria": "cpe:2.3:a:manageengine:applications_manager:13.0:*:*:*:*:*:*:*", "matchCriteriaId": "F795F87E-8619-4430-8647-26A00062C14E" } ] } ] } ], "references": [ { "url": "http://packetstormsecurity.com/files/158554/ManageEngine-Applications-Manager-13-SQL-Injection.html", "source": "cret@cert.org" }, { "url": "http://seclists.org/fulldisclosure/2017/Apr/9", "source": "cret@cert.org", "tags": [ "Mailing List", "Third Party Advisory" ] }, { "url": "http://www.securityfocus.com/bid/97394", "source": "cret@cert.org", "tags": [ "VDB Entry", "Third Party Advisory" ] }, { "url": "https://packetstormsecurity.com/files/142022/ManageEngine-Applications-Manager-12-13-XSS-SQL-Injection-Code-Execution.html", "source": "cret@cert.org", "tags": [ "Third Party Advisory", "VDB Entry" ] }, { "url": "https://www.manageengine.com/products/applications_manager/security-updates/security-updates-cve-2016-9488.html", "source": "cret@cert.org" } ] }