9.8
CVSSv3

CVE-2020-28653

Published: 03/02/2021 Updated: 18/04/2022
CVSS v2 Base Score: 7.5 | Impact Score: 6.4 | Exploitability Score: 10
CVSS v3 Base Score: 9.8 | Impact Score: 5.9 | Exploitability Score: 3.9
VMScore: 668
Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Summary

Zoho ManageEngine OpManager Stable build prior to 125203 (and Released build prior to 125233) allows Remote Code Execution via the Smart Update Manager (SUM) servlet.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

zohocorp manageengine opmanager

zohocorp manageengine opmanager 12.5

Exploits

An HTTP endpoint used by the Manage Engine OpManager Smart Update Manager component can be leveraged to deserialize an arbitrary Java object This can be abused by an unauthenticated remote attacker to execute OS commands in the context of the OpManager application This vulnerability is also present in other products that are built on top of the O ...

Github Repositories

CVE-2020-28653 Version: 2016 - 2020 (before patch) Usage: python exploitpy vuln-webcom

Manage Engine OpManager CVE-2020-28653 Proof of Concept This proof of concept detects whether a Manage Engine OpManager instance is vulnerable to CVE-2020-28653 Detection is performed by firing off a request containing the serialized payload to the instance Upon the payload being deserialized, it will cause the instance to invoke a DNS Lookup Installation Clone the reposit

Manage Engine OpManager CVE-2020-28653 Proof of Concept This proof of concept detects whether a Manage Engine OpManager instance is vulnerable to CVE-2020-28653 Detection is performed by firing off a request containing the serialized payload to the instance Upon the payload being deserialized, it will cause the instance to invoke a DNS Lookup Installation Clone the reposit