Intrusion Prevention

ZOHO.ManageEngine.DataSecurity.Plus.Directory.Traversal

Description

This indicates an attack attempt to exploit a Directory Traversal Vulnerability in Zoho Corporation ManageEngine DataSecurity Plus.
he vulnerability is due to lack of validation of the database schema name when handling a DR-SCHEMA-SYNC request in DataEngine Xnode Server application. A remote, authenticated attacker can exploit the vulnerability by sending malicious requests to the target server. Successful exploitation could result in the arbitrary file write and, in the worst case, remote code execution under the security context of the DataEngine XNode server.

Affected Products

Zoho Corporation ManageEngine DataSecurity Plus prior to Build 6013

Impact

System Compromise: Remote attackers can gain control of vulnerable systems.

Recommended Actions

Apply the most recent upgrade or patch from the vendor.
https://www.manageengine.com/data-security/release-notes.html

CVE References

CVE-2020-11531