CVE Vulnerabilities

CVE-2019-12133

Uncontrolled Search Path Element

Published: Jun 18, 2019 | Modified: Aug 24, 2020
CVSS 3.x
7.8
HIGH
Source:
NVD
CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
CVSS 2.x
7.2 HIGH
AV:L/AC:L/Au:N/C:C/I:C/A:C
RedHat/V2
RedHat/V3
Ubuntu

Multiple Zoho ManageEngine products suffer from local privilege escalation due to improper permissions for the %SYSTEMDRIVE%ManageEngine directory and its sub-folders. Moreover, the services associated with said products try to execute binaries such as sc.exe from the current directory upon system start. This will effectively allow non-privileged users to escalate privileges to NT AUTHORITYSYSTEM. This affects Desktop Central 10.0.380, EventLog Analyzer 12.0.2, ServiceDesk Plus 10.0.0, SupportCenter Plus 8.1, O365 Manager Plus 4.0, Mobile Device Manager Plus 9.0.0, Patch Connect Plus 9.0.0, Vulnerability Manager Plus 9.0.0, Patch Manager Plus 9.0.0, OpManager 12.3, NetFlow Analyzer 11.0, OpUtils 11.0, Network Configuration Manager 11.0, FireWall 12.0, Key Manager Plus 5.6, Password Manager Pro 9.9, Analytics Plus 1.0, and Browser Security Plus.

Weakness

The product uses a fixed or controlled search path to find resources, but one or more locations in that path can be under the control of unintended actors.

Affected Software

Name Vendor Start Version End Version
Manageengine_analytics_plus Zohocorp 1.0 (including) 1.0 (including)
Manageengine_browser_security_plus Zohocorp - (including) - (including)
Manageengine_desktop_central Zohocorp 10.0.380 (including) 10.0.380 (including)
Manageengine_eventlog_analyzer Zohocorp 12.0.2 (including) 12.0.2 (including)
Manageengine_firewall Zohocorp 12.0 (including) 12.0 (including)
Manageengine_key_manager_plus Zohocorp 5.6 (including) 5.6 (including)
Manageengine_mobile_device_manager_plus Zohocorp 9.0.0 (including) 9.0.0 (including)
Manageengine_netflow_analyzer Zohocorp 11.0 (including) 11.0 (including)
Manageengine_network_configuration_manager Zohocorp 11.0 (including) 11.0 (including)
Manageengine_o365_manager_plus Zohocorp 4.0 (including) 4.0 (including)
Manageengine_opmanager Zohocorp 12.3 (including) 12.3 (including)
Manageengine_oputils Zohocorp 11.0 (including) 11.0 (including)
Manageengine_password_manager_pro Zohocorp 9.9 (including) 9.9 (including)
Manageengine_patch_connect_plus Zohocorp 9.0.0 (including) 9.0.0 (including)
Manageengine_patch_manager_plus Zohocorp 9.0.0 (including) 9.0.0 (including)
Manageengine_servicedesk_plus Zohocorp 10.0.0 (including) 10.0.0 (including)
Manageengine_supportcenter_plus Zohocorp 8.1 (including) 8.1 (including)
Manageengine_vulnerability_manager_plus Zohocorp 9.0.0 (including) 9.0.0 (including)

Extended Description

Although this weakness can occur with any type of resource, it is frequently introduced when a product uses a directory search path to find executables or code libraries, but the path contains a directory that can be modified by an attacker, such as “/tmp” or the current working directory. In Windows-based systems, when the LoadLibrary or LoadLibraryEx function is called with a DLL name that does not contain a fully qualified path, the function follows a search order that includes two path elements that might be uncontrolled:

In some cases, the attack can be conducted remotely, such as when SMB or WebDAV network shares are used. One or more locations in that path could include the Windows drive root or its subdirectories. This often exists in Linux-based code assuming the controlled nature of the root directory (/) or its subdirectories (/etc, etc), or a code that recursively accesses the parent directory. In Windows, the drive root and some of its subdirectories have weak permissions by default, which makes them uncontrolled. In some Unix-based systems, a PATH might be created that contains an empty element, e.g. by splicing an empty variable into the PATH. This empty element can be interpreted as equivalent to the current working directory, which might be an untrusted search element. In software package management frameworks (e.g., npm, RubyGems, or PyPi), the framework may identify dependencies on third-party libraries or other packages, then consult a repository that contains the desired package. The framework may search a public repository before a private repository. This could be exploited by attackers by placing a malicious package in the public repository that has the same name as a package from the private repository. The search path might not be directly under control of the developer relying on the framework, but this search order effectively contains an untrusted element.

Potential Mitigations

References