670
VMScore

CVE-2022-28219

Published: 05/04/2022 Updated: 26/10/2022
CVSS v2 Base Score: 7.5 | Impact Score: 6.4 | Exploitability Score: 10
CVSS v3 Base Score: 9.8 | Impact Score: 5.9 | Exploitability Score: 3.9
VMScore: 670
Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Summary

Cewolf in Zoho ManageEngine ADAudit Plus prior to 7060 is vulnerable to an unauthenticated XXE attack that leads to Remote Code Execution.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

zohocorp manageengine adaudit plus 7.0

zohocorp manageengine adaudit plus

Exploits

This Metasploit module exploits CVE-2022-28219, which is a pair of vulnerabilities in ManageEngine ADAudit Plus versions before build 7060 They include a path traversal in the /cewolf endpoint along with a blind XML external entity injection vulnerability to upload and execute a file ...

Github Repositories

Code to support my CVE-2022-28219 analysis To execute, with Ruby and Rubygems installed: gem install httparty ruby /manageengine-pocrb <target> <port> <domain> <your ip> This is designed as a proof of concept, not a stable exploit It only runs calc :)

建立一個概念類似 CVE-2022-28219 的測試環境

CVE-2022-28219-Like 建立一個概念類似 CVE-2022-28219 的測試環境

A collection of red blue team staff

red blue team party 🎉🏴‍☠️ - Redteam🗡 Go to blueteam🛡️ • Tools Linkedlnt Spoofcheck Pagodo wintnessMe Linkedin2username Recong-ng Cloud_enum Buster S3Scanner Gitleaks Rustscan Amass AzureWorkahop Nicoff eagle-rs Search engines Gpu poisoning Cutter Stormspotter Hack tools s3sec Function stomping AZURE red team WinAPI Adversarial toolbox Offensive rus

PoC for ManageEngine ADAudit Plus CVE-2022-28219

CVE-2022-28219 POC for CVE-2022-28219 affecting ManageEngine ADAudit Plus builds < 7060 Technical Analysis More details on our blog: wwwhorizon3ai/red-team-blog-cve-2022-28219 Usage % python3 CVE-2022-28219py -h usage: CVE-2022-28219py [-h] -t TARGET -l LHOST -d DOMAIN [-lhp HTTP_PORT] [-lfp FTP_PORT] [-f FILE] [-c COMMAND] [-u USER] optional arguments: -h

A collection of red blue team staff

red blue team party 🎉🏴‍☠️ - Redteam🗡 Go to blueteam🛡️ • Tools Linkedlnt Spoofcheck Pagodo wintnessMe Linkedin2username Recong-ng Cloud_enum Buster S3Scanner Gitleaks Rustscan Amass AzureWorkahop Nicoff eagle-rs Search engines Gpu poisoning Cutter Stormspotter Hack tools s3sec Function stomping AZURE red team WinAPI Adversarial toolbox Offensive rus