info: name: ManageEngine OpManager SumPDU 12.1-12.5.232- Java Deserialization author: iamnoooob,pdresearch severity: critical description: | An HTTP endpoint used by the Manage Engine OpManager Smart Update Manager component can be leveraged to deserialize an arbitrary Java object. This can be abused by an unauthenticated remote attacker to execute OS commands in the context of the OpManager application (NT AUTHORITY\SYSTEM on Windows or root on Linux). This vulnerability is also present in other products that are built on top of the OpManager application. This vulnerability affects OpManager versions 12.1-12.5.232. reference: - http://packetstormsecurity.com/files/164231/ManageEngine-OpManager-SumPDU-Java-Deserialization.html - https://github.com/AdeliaNitzsche/Java-Deserialization-Cheat-Sheet - https://github.com/GrrrDog/Java-Deserialization-Cheat-Sheet - https://github.com/HimmelAward/Goby_POC - https://github.com/nomi-sec/PoC-in-GitHub classification: cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H cvss-score:9.8 cve-id: CVE-2020-28653 epss-score:0.80604 epss-percentile:0.99072 cpe: cpe:2.3:a:zohocorp:manageengine_opmanager:*:*:*:*:*:*:*:* metadata: vendor: zohocorp product: manageengine_opmanager shodan-query: - http.title:"opmanager plus" - http.title:"opmanager" fofa-query: - title="opmanager plus" - title="opmanager" google-query: - intitle:"opmanager plus" - intitle:"opmanager" tags: packetstorm,java, deserialization, rce, opmanager,demo,intrusive