ManageEngine.DataSecurity.Plus.Directory.Traversal
Description
This indicates an attack attempt to exploit a Directory Traversal Vulnerability in Zoho Corporation ManageEngine DataSecurity Plus.
he vulnerability is due to lack of validation of the database schema name when handling a DR-SCHEMA-SYNC request in DataEngine Xnode Server application. A remote, authenticated attacker can exploit the vulnerability by sending malicious requests to the target server. Successful exploitation could result in the arbitrary file write and, in the worst case, remote code execution under the security context of the DataEngine XNode server.
Affected Products
Zoho Corporation ManageEngine DataSecurity Plus prior to Build 6013
Impact
System Compromise: Remote attackers can gain control of vulnerable systems.
Recommended Actions
Apply the most recent upgrade or patch from the vendor.
https://www.manageengine.com/data-security/release-notes.html
Telemetry
Coverage
IPS (Regular DB) | |
IPS (Extended DB) |
Version Updates
Date | Version | Detail |
---|---|---|
2023-08-03 | 25.614 | Name:ZOHO. ManageEngine. DataSecurity. Plus. Directory. Traversal:ManageEngine. DataSecurity. Plus. Directory. Traversal |
2021-03-09 | 18.032 | |
2020-09-30 | 16.934 | Name:Zoho. ManageEngine. DataSecurity. Plus. Directory. Traversal:ZOHO. ManageEngine. DataSecurity. Plus. Directory. Traversal |
2020-07-01 | 15.877 | Default_action:pass:drop |
2020-06-09 | 15.861 |