module

ManageEngine Endpoint Central Unauthenticated SAML RCE

Disclosed
Jan 10, 2023
Created
Feb 9, 2023

Description

This exploits an unauthenticated remote code execution vulnerability
that affects Zoho ManageEngine Endpoint Central and MSP versions 10.1.2228.10
and below (CVE-2022-47966). Due to a dependency to an outdated library
(Apache Santuario version 1.4.1), it is possible to execute arbitrary
code by providing a crafted `samlResponse` XML to the Endpoint Central
SAML endpoint. Note that the target is only vulnerable if it is
configured with SAML-based SSO , and the service should be active.

Authors

Khoa Dinh
horizon3ai
Christophe De La Fuente
h00die-gr3y h00die.gr3y@gmail.com

Platform

Java,Windows

Module Options

To display the available options, load the module within the Metasploit console and run the commands 'show options' or 'show advanced':


msf > use exploit/windows/http/manageengine_endpoint_central_saml_rce_cve_2022_47966
msf exploit(manageengine_endpoint_central_saml_rce_cve_2022_47966) > show targets
...targets...
msf exploit(manageengine_endpoint_central_saml_rce_cve_2022_47966) > set TARGET < target-id >
msf exploit(manageengine_endpoint_central_saml_rce_cve_2022_47966) > show options
...show and set options...
msf exploit(manageengine_endpoint_central_saml_rce_cve_2022_47966) > exploit

Title
NEW

Explore Exposure Command

Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.