Cross-Site Scripting Vulnerability in ManageEngine AD Self Service Plus (CVE-2021-27956)

the exploit blog logo
The Exploit: Penetration Testing Insights From The Frontlines
Posted on May 20, 2021
Cross-Site Scripting Vulnerability in ManageEngine AD Self Service Plus (CVE-2021-27956)

Written by Raxis Research Team

I’m Matt Dunn, lead penetration tester at Raxis.This is a summary of the first stored cross-site scripting vulnerability I discovered while testing several Zoho-owned ManageEngine products. This vulnerability exists in the AD Self Service Plus Version 6.1.

Summary

Recently I discovered a stored cross-site scripting (XSS) vulnerability in the Zoho-owned ManageEngine AD Self Service Plus for Version 6.1 (CVE-2021-27956). The vulnerability exists in the email field of search results on the page: /webclient/index.html#/directory-search. After searching for a user, if the “More” tab is clicked, the email field is loaded with unescaped content, allowing for malicious JavaScript to be reflected back to users.

Proof of Concept

The vulnerability can be triggered by inserting HTML content, in this case script tags, into the email field of an Active Directory user. The following was inserted as a proof of concept to reflect the user’s cookie in an alert box:

<script>alert(document.cookie)</script>

An example of this on one such user is shown here:

Stored XSS Payload

After searching for that user, the HTML is then presented unescaped on the web page, which allows the script tags to be loaded as valid JavaScript. The unescaped HTML as loaded is shown here:

Unescaped JavaScript Tags

After loading the search page, clicking the “More” tab triggers the vulnerability, which is shown in Figure 3:

XSS Payload Executed
Affected Versions

Raxis discovered this vulnerability on ManageEngine AD Self Service Plus 6.1, build 6100.

Remediation

Upgrade ManageEngine AD Self Service Plus to Build Version 6104 immediately. The ServicePack can be found here with release notes here.

Disclosure Timeline
  • February 19, 2021 Vulnerability reported to Zoho
  • February 19, 2021 Zoho begins investigation into report
  • March 5, 2021 CVE-2021-27956 assigned to this vulnerability
  • May 8, 2021 Zoho releases patch for this vulnerability

CVE Links

Raxis Research Team

Raxis Research Team

The Raxis Research Team is dedicated to staying ahead of the threat landscape. Our experts dig into emerging exploits, uncover hidden vulnerabilities, and develop resources that power our penetration testing engagements. By combining curiosity with technical precision, the team equips Raxis testers with cutting-edge intelligence to simulate real-world attacks and strengthen client defenses.

Search The Exploit Blog

Stay up to date with the latest in penetration testing

Name(Required)
Newsletter(Required)
Do you wish to join our newsletter? We send out emails once a month that cover the latest in cybersecurity news. We do not sell your information to other parties.