@@ -139299,6 +139299,72 @@
139299139299 "session_types": false,
139300139300 "needs_cleanup": true
139301139301 },
139302+ "exploit_windows/http/manageengine_servicedesk_plus_cve_2021_44077": {
139303+ "name": "ManageEngine ServiceDesk Plus CVE-2021-44077",
139304+ "fullname": "exploit/windows/http/manageengine_servicedesk_plus_cve_2021_44077",
139305+ "aliases": [
139306+
139307+ ],
139308+ "rank": 600,
139309+ "disclosure_date": "2021-09-16",
139310+ "type": "exploit",
139311+ "author": [
139312+ 139313+ "Y4er"
139314+ ],
139315+ "description": "This module exploits CVE-2021-44077, an unauthenticated remote code\n execution vulnerability in ManageEngine ServiceDesk Plus, to upload an\n EXE (msiexec.exe) and execute it as the SYSTEM account.\n\n Note that build 11305 is vulnerable to the authentication bypass but\n not the file upload. The module will check for an exploitable build.",
139316+ "references": [
139317+ "CVE-2021-44077",
139318+ "URL-https://pitstop.manageengine.com/portal/en/community/topic/security-advisory-authentication-bypass-vulnerability-in-servicedesk-plus-versions-11138-and-above",
139319+ "URL-https://pitstop.manageengine.com/portal/en/community/topic/security-advisory-for-cve-2021-44077-unauthenticated-rce-vulnerability-in-servicedesk-plus-versions-up-to-11305-22-11-2021",
139320+ "URL-https://www.cisa.gov/uscert/ncas/alerts/aa21-336a",
139321+ "URL-https://unit42.paloaltonetworks.com/tiltedtemple-manageengine-servicedesk-plus/",
139322+ "URL-https://attackerkb.com/topics/qv2aD8YfMN/cve-2021-44077/rapid7-analysis",
139323+ "URL-https://xz.aliyun.com/t/10631"
139324+ ],
139325+ "platform": "Windows",
139326+ "arch": "x86, x64",
139327+ "rport": 8080,
139328+ "autofilter_ports": [
139329+ 80,
139330+ 8080,
139331+ 443,
139332+ 8000,
139333+ 8888,
139334+ 8880,
139335+ 8008,
139336+ 3000,
139337+ 8443
139338+ ],
139339+ "autofilter_services": [
139340+ "http",
139341+ "https"
139342+ ],
139343+ "targets": [
139344+ "Windows Dropper"
139345+ ],
139346+ "mod_time": "2021-12-09 17:27:35 +0000",
139347+ "path": "/modules/exploits/windows/http/manageengine_servicedesk_plus_cve_2021_44077.rb",
139348+ "is_install_path": true,
139349+ "ref_name": "windows/http/manageengine_servicedesk_plus_cve_2021_44077",
139350+ "check": true,
139351+ "post_auth": false,
139352+ "default_credential": false,
139353+ "notes": {
139354+ "Stability": [
139355+ "crash-safe"
139356+ ],
139357+ "Reliability": [
139358+ "repeatable-session"
139359+ ],
139360+ "SideEffects": [
139361+ "ioc-in-logs",
139362+ "artifacts-on-disk"
139363+ ]
139364+ },
139365+ "session_types": false,
139366+ "needs_cleanup": null
139367+ },
139302139368 "exploit_windows/http/maxdb_webdbm_database": {
139303139369 "name": "MaxDB WebDBM Database Parameter Overflow",
139304139370 "fullname": "exploit/windows/http/maxdb_webdbm_database",
0 commit comments