CVE-2014-7864CVE-2014-7864

Affected configuration(s):

cpe:/a:zohocorp:manageengine_opmanager:8.8
cpe:/a:zohocorp:manageengine_opmanager:9.0
cpe:/a:zohocorp:manageengine_opmanager:9.1
cpe:/a:zohocorp:manageengine_opmanager:9.2
cpe:/a:zohocorp:manageengine_opmanager:9.4
cpe:/a:zohocorp:manageengine_opmanager:10.0
cpe:/a:zohocorp:manageengine_opmanager:10.1
cpe:/a:zohocorp:manageengine_opmanager:10.2
cpe:/a:zohocorp:manageengine_opmanager:11.0
cpe:/a:zohocorp:manageengine_opmanager:11.1
cpe:/a:zohocorp:manageengine_opmanager:11.2
cpe:/a:zohocorp:manageengine_opmanager:11.3
cpe:/a:zohocorp:manageengine_opmanager:11.4
cpe:/a:zohocorp:manageengine_opmanager:11.5

Date published: 2015-02-04T11:59:00.060-05:00

Date last modified: 2017-09-07T21:29:17.387-04:00

CVSS Score: 7.5

Principal attack vector: NETWORK

Complexity:  LOW

Reference URL: http://packetstormsecurity.com/files/130162/ManageEngine-File-Download-Content-Disclosure-SQL-Injection.html

Summary: Multiple SQL injection vulnerabilities in the FailOverHelperServlet (aka FailServlet) servlet in ZOHO ManageEngine OpManager 8 through 11.5 build 11400 and IT360 10.5 and earlier allow remote attackers and remote authenticated users to execute arbitrary SQL commands via the (1) customerName or (2) serverRole parameter in a standbyUpdateInCentral operation to servlet/com.adventnet.me.opmanager.servlet.FailOverHelperServlet.

CategoriesUncategorised

Leave a Reply

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.