漏洞信息
漏洞名称: ManageEngine OpManager SumPDU Java反序列化漏洞
漏洞编号:
漏洞类型: 反序列化
漏洞等级: 严重
漏洞描述: Zoho ManageEngine OpManager是一款广泛使用的网络监控和管理软件,适用于企业级网络环境,能够提供网络性能监控、故障管理等功能。该软件在12.5.329版本之前存在一个严重的反序列化漏洞,允许未经认证的攻击者实现远程代码执行。此漏洞的根源在于对用户输入的反序列化操作缺乏适当的验证和过滤,导致攻击者可以构造恶意的序列化数据,触发服务器端执行任意代码。由于该漏洞无需认证即可利用,且攻击复杂度低,攻击者可以轻易地利用此漏洞完全控制受影响的系统,导致数据泄露、服务中断等严重后果。该漏洞已被标记为CVE-2021-3287,CVSS评分为9.8,属于严重级别。建议所有使用ManageEngine OpManager的用户立即升级到12.5.329或更高版本以修复此漏洞。
产品厂商: zohocorp
产品名称: ManageEngine OpManager
影响版本: version < 12.5.329
搜索语法: title=”opmanager plus” OR title=”opmanager”
来源: https://github.com/projectdiscovery/nuclei-templates/blob/e1b44dbca298d003dbd5843dc816024516558491/http%2Fcves%2F2021%2FCVE-2021-3287.yaml
类型: projectdiscovery/nuclei-templates:github issues
POC详情
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63
| id: CVE-2021-3287
info: name: ManageEngine OpManager SumPDU - Java Deserialization author: tomaquet18 severity: critical description: | Zoho ManageEngine OpManager before 12.5.329 allows unauthenticated Remote Code Execution due to a general bypass in the deserialization class. reference: - https://haxolot.com/posts/2021/manageengine_opmanager_pre_auth_rce/ - https://nvd.nist.gov/vuln/detail/CVE-2021-3287 - https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/multi/http/opmanager_sumpdu_deserialization.rb classification: cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H cvss-score: 9.8 cve-id: CVE-2021-3287 cwe-id: CWE-502 epss-score: 0.71116 epss-percentile: 0.9861 cpe: cpe:2.3:a:zohocorp:manageengine_opmanager:*:*:*:*:*:*:*:* metadata: vendor: zohocorp product: manageengine_opmanager shodan-query: - http.title:"opmanager plus" - http.title:"opmanager" fofa-query: - title="opmanager plus" - title="opmanager" google-query: - intitle:"opmanager plus" - intitle:"opmanager" verified: true max-request: 1 tags: cve,cve2021,rce,java,deserialization,opmanager,kev
http: - raw: - | POST /servlets/com.adventnet.tools.sum.transport.SUMHandShakeServlet HTTP/1.1 Host: {{Hostname}} Content-Type: application/octet-stream
{{hex_decode("aced00057704000003ea")}}
matchers-condition: and matchers: - type: binary part: body binary: - "aced0005"
- type: word part: set_cookie words: - "JSESSIONID="
- type: status status: - 200
|