module

ManageEngine Desktop Central StatusUpdate Arbitrary File Upload

Disclosed
Aug 31, 2014
Created
May 30, 2018

Description

This module exploits an arbitrary file upload vulnerability in ManageEngine DesktopCentral
v7 to v9 build 90054 (including the MSP versions).
A malicious user can upload a JSP file into the web root without authentication, leading to
arbitrary code execution as SYSTEM. Some early builds of version 7 are not exploitable as
they do not ship with a bundled Java compiler.

Author

Pedro Ribeiro [email protected]

Platform

Windows

Architectures

x86

Module Options

To display the available options, load the module within the Metasploit console and run the commands 'show options' or 'show advanced':


msf > use exploit/windows/http/desktopcentral_statusupdate_upload
msf exploit(desktopcentral_statusupdate_upload) > show targets
...targets...
msf exploit(desktopcentral_statusupdate_upload) > set TARGET < target-id >
msf exploit(desktopcentral_statusupdate_upload) > show options
...show and set options...
msf exploit(desktopcentral_statusupdate_upload) > exploit

Title
NEW

Explore Exposure Command

Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.