CVE-2022-25245: ManageEngine Asset Explorer Information Leakage

the exploit blog logo
The Exploit: Penetration Testing Insights From The Frontlines
Posted on June 7, 2022
CVE-2022-25245: ManageEngine Asset Explorer Information Leakage

Written by Raxis Research Team

I’m Matt Dunn, a lead penetration tester at Raxis. Recently, I discovered an information leakage in ManageEngine Asset Explorer. This is a relatively minor information leakage, as it only leaks the currency that a current vendor uses. Though minor, it could lead to other inferred information such as vendor location based on their currency.

Proof of Concept

The information leakage occurs in the AJaxDomainServlet when given the action of getVendorCurrency. This servlet action does not require authentication, allowing a user to obtain a vendor’s currency with a GET request to a URL similar to the following:

http://192.168.148.128:8011/domainServlet/AJaxDomainServlet?action=getVendorCurrency&vendorId=3

In this example URL, we request the currency for the vendor with the specified vendorId. If the vendor doesn’t have an assigned currency, the dollar symbol is returned. If it does, the vendor’s specific currency identifier is returned, as shown here:

Vendor Currency Revealed in Unauthenticated Request
Affected Versions

Raxis discovered this vulnerability on Manage Engine Asset Explorer Plus 6.9 Build 6970.

Remediation

Upgrade ManageEngine Asset Explorer to Version 6.9 Build 6971 or later, which can be found here:

Disclosure Timeline
  • February 14, 2022 – Vulnerability reported to Zoho
  • February 15, 2022 – Zoho begins investigation into report
  • February 16, 2022 CVE-2022-25245 is assigned to this vulnerability
  • March 9, 2022 – Zoho releases fixed version 6.9 Build 6971
CVE Links

 

Raxis Research Team

Raxis Research Team

The Raxis Research Team is dedicated to staying ahead of the threat landscape. Our experts dig into emerging exploits, uncover hidden vulnerabilities, and develop resources that power our penetration testing engagements. By combining curiosity with technical precision, the team equips Raxis testers with cutting-edge intelligence to simulate real-world attacks and strengthen client defenses.

Search The Exploit Blog

Stay up to date with the latest in penetration testing

Name(Required)
Newsletter(Required)
Do you wish to join our newsletter? We send out emails once a month that cover the latest in cybersecurity news. We do not sell your information to other parties.