A CSV injection vulnerability on the login panel of ManageEngine ADSelfService Plus Version: 6.1 Build No: 6101 can be exploited by an unauthenticated user. The j_username parameter seems to be vulnerable and a reverse shell could be obtained if a privileged user exports User Attempts Audit Report as CSV file. Note: The vendor disputes this vulnerability, claiming This is not a valid vulnerability in our ADSSP product. We dont see this as a security issue at our side.
The product saves user-provided information into a Comma-Separated Value (CSV) file, but it does not neutralize or incorrectly neutralizes special elements that could be interpreted as a command when the file is opened by a spreadsheet product.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Manageengine_adselfservice_plus | Zohocorp | 6.1-6101 (including) | 6.1-6101 (including) |