ManageEngine OpManager SumPDU Java反序列化漏洞

漏洞信息

漏洞名称: ManageEngine OpManager SumPDU Java反序列化漏洞

漏洞编号:

  • CVE: CVE-2021-3287

漏洞类型: 反序列化

漏洞等级: 严重

漏洞描述: Zoho ManageEngine OpManager是一款广泛使用的网络监控和管理软件,适用于企业级网络环境,能够提供网络性能监控、故障管理等功能。该软件在12.5.329版本之前存在一个严重的反序列化漏洞,允许未经认证的攻击者实现远程代码执行。此漏洞的根源在于对用户输入的反序列化操作缺乏适当的验证和过滤,导致攻击者可以构造恶意的序列化数据,触发服务器端执行任意代码。由于该漏洞无需认证即可利用,且攻击复杂度低,攻击者可以轻易地利用此漏洞完全控制受影响的系统,导致数据泄露、服务中断等严重后果。该漏洞已被标记为CVE-2021-3287,CVSS评分为9.8,属于严重级别。建议所有使用ManageEngine OpManager的用户立即升级到12.5.329或更高版本以修复此漏洞。

产品厂商: zohocorp

产品名称: ManageEngine OpManager

影响版本: version < 12.5.329

搜索语法: title=”opmanager plus” OR title=”opmanager”

来源: https://github.com/projectdiscovery/nuclei-templates/blob/e1b44dbca298d003dbd5843dc816024516558491/http%2Fcves%2F2021%2FCVE-2021-3287.yaml

类型: projectdiscovery/nuclei-templates:github issues

POC详情

1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63

id: CVE-2021-3287

info:
name: ManageEngine OpManager SumPDU - Java Deserialization
author: tomaquet18
severity: critical
description: |
Zoho ManageEngine OpManager before 12.5.329 allows unauthenticated Remote Code Execution due to a general bypass in the deserialization class.
reference:
- https://haxolot.com/posts/2021/manageengine_opmanager_pre_auth_rce/
- https://nvd.nist.gov/vuln/detail/CVE-2021-3287
- https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/multi/http/opmanager_sumpdu_deserialization.rb
classification:
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
cvss-score: 9.8
cve-id: CVE-2021-3287
cwe-id: CWE-502
epss-score: 0.71116
epss-percentile: 0.9861
cpe: cpe:2.3:a:zohocorp:manageengine_opmanager:*:*:*:*:*:*:*:*
metadata:
vendor: zohocorp
product: manageengine_opmanager
shodan-query:
- http.title:"opmanager plus"
- http.title:"opmanager"
fofa-query:
- title="opmanager plus"
- title="opmanager"
google-query:
- intitle:"opmanager plus"
- intitle:"opmanager"
verified: true
max-request: 1
tags: cve,cve2021,rce,java,deserialization,opmanager,kev

http:
- raw:
- |
POST /servlets/com.adventnet.tools.sum.transport.SUMHandShakeServlet HTTP/1.1
Host: {{Hostname}}
Content-Type: application/octet-stream

{{hex_decode("aced00057704000003ea")}}

matchers-condition: and
matchers:
- type: binary
part: body
binary:
- "aced0005" # Java serialization stream header

- type: word
part: set_cookie
words:
- "JSESSIONID="

- type: status
status:
- 200



ManageEngine OpManager SumPDU Java反序列化漏洞
http://example.com/2025/07/10/github_4263361113/
作者
lianccc
发布于
2025年7月10日
许可协议