This indicates an attack attempt to exploit a Directory Traversal Vulnerability in Zoho Corporation ManageEngine DataSecurity Plus.
he vulnerability is due to lack of validation of the database schema name when handling a DR-SCHEMA-SYNC request in DataEngine Xnode Server application. A remote, authenticated attacker can exploit the vulnerability by sending malicious requests to the target server. Successful exploitation could result in the arbitrary file write and, in the worst case, remote code execution under the security context of the DataEngine XNode server.
Zoho Corporation ManageEngine DataSecurity Plus prior to Build 6013
System Compromise: Remote attackers can gain control of vulnerable systems.
Apply the most recent upgrade or patch from the vendor.