ManageEngine.DataSecurity.Plus.Directory.Traversal

description-logoDescription

This indicates an attack attempt to exploit a Directory Traversal Vulnerability in Zoho Corporation ManageEngine DataSecurity Plus.
he vulnerability is due to lack of validation of the database schema name when handling a DR-SCHEMA-SYNC request in DataEngine Xnode Server application. A remote, authenticated attacker can exploit the vulnerability by sending malicious requests to the target server. Successful exploitation could result in the arbitrary file write and, in the worst case, remote code execution under the security context of the DataEngine XNode server.

affected-products-logoAffected Products

Zoho Corporation ManageEngine DataSecurity Plus prior to Build 6013

Impact logoImpact

System Compromise: Remote attackers can gain control of vulnerable systems.

recomended-action-logoRecommended Actions

Apply the most recent upgrade or patch from the vendor.
https://www.manageengine.com/data-security/release-notes.html

Telemetry logoTelemetry

Coverage

IPS (Regular DB)
IPS (Extended DB)

Version Updates

Date Version Detail
2023-08-03 25.614 Name:ZOHO.
ManageEngine.
DataSecurity.
Plus.
Directory.
Traversal:ManageEngine.
DataSecurity.
Plus.
Directory.
Traversal
2021-03-09 18.032
2020-09-30 16.934 Name:Zoho.
ManageEngine.
DataSecurity.
Plus.
Directory.
Traversal:ZOHO.
ManageEngine.
DataSecurity.
Plus.
Directory.
Traversal
2020-07-01 15.877 Default_action:pass:drop
2020-06-09 15.861