CVE-2022-25245: ManageEngine Asset Explorer Information Leakage

I’m Matt Dunn, a lead penetration tester at Raxis. Recently, I discovered an information leakage in ManageEngine Asset Explorer. This is a relatively minor information leakage, as it only leaks the currency that a current vendor uses. Though minor, it could lead to other inferred information such as vendor location based on their currency.

Proof of Concept

The information leakage occurs in the AJaxDomainServlet when given the action of getVendorCurrency. This servlet action does not require authentication, allowing a user to obtain a vendor’s currency with a GET request to a URL similar to the following:

http://192.168.148.128:8011/domainServlet/AJaxDomainServlet?action=getVendorCurrency&vendorId=3

In this example URL, we request the currency for the vendor with the specified vendorId. If the vendor doesn’t have an assigned currency, the dollar symbol is returned. If it does, the vendor’s specific currency identifier is returned, as shown here:

Vendor Currency Revealed in Unauthenticated Request
Affected Versions

Raxis discovered this vulnerability on Manage Engine Asset Explorer Plus 6.9 Build 6970.

Remediation

Upgrade ManageEngine Asset Explorer to Version 6.9 Build 6971 or later, which can be found here:

Disclosure Timeline
  • February 14, 2022 – Vulnerability reported to Zoho
  • February 15, 2022 – Zoho begins investigation into report
  • February 16, 2022 CVE-2022-25245 is assigned to this vulnerability
  • March 9, 2022 – Zoho releases fixed version 6.9 Build 6971
CVE Links

 

Raxis X logo as document separator
CVE-2022-25245: ManageEngine Asset Explorer Information Leakage
PenTest As a SErvice

Penetration Testing as a Service doesn’t have to be a dressed up vulnerability scan. Raxis PTaaS delivers a solid pentest done right and when you need it.

Blog CAtegories