[Security advisory for CVE-2021-44526 and CVE-2021-44515] Authentication bypass vulnerabilities in ServiceDesk Plus and Desktop Central

[Security advisory for CVE-2021-44526 and CVE-2021-44515] Authentication bypass vulnerabilities in ServiceDesk Plus and Desktop Central

Hi there,

 

This security advisory addresses two authentication bypass vulnerabilities that affect ServiceDesk Plus versions up to 12002 [CVE-2021-44526] and ServiceDesk Plus customers who use the Desktop Central agent for asset discovery [CVE-2021-44515].

 

Important note: If you are a customer of the Professional or Enterprise edition of ServiceDesk Plus who uses the Desktop Central agent for asset discovery, follow the steps outlined in the advisories for both CVE-2021-44526 and CVE-2021-44515.

If you are a customer of ServiceDesk Plus who does not use the Desktop Central agent, please only follow the steps outlined in the advisory for CVE-2021-44526, explained in this post.

 

CVE-2021-44515 affects customers of the Professional and Enterprise editions of ServiceDesk Plus who use the Desktop Central agent for asset discovery and can lead to a remote code execution attack. We strongly urge customers who use the Desktop Central agent to refer to this security advisory for more information and the steps to upgrade Desktop Central to the latest version.

 

CVE-2021-44526 affects customers using all editions of the on-premises version of ServiceDesk Plus versions 12002 and below, irrespective of whether they use the Desktop Central agent, and we strongly urge all customers to upgrade to the latest version of ServiceDesk Plus immediately. This vulnerability does not affect ServiceDesk Plus Cloud versions.

 

The rest of the advisory will be focused on CVE-2021-44526, an authentication bypass vulnerability in ServiceDesk Plus versions up to 12002.

 

Severity: High

 

Impact:

This vulnerability can allow an adversary to bypass authentication and access Templates’ field and form rules, Technician Auto Assign settings, the Asset Field's Allowed Values, Translation and Change SLA configurations, the Assets associated to a user, and role details from Change Templates, as well as reorder the Service Catalog.

 

 

What led to the vulnerability?

One of the application filters used for handling state in the list view was not configured properly, and a crafted URL using this filter would enable an authenticated servlet to be accessed without proper authentication. APIs and other URL calls are not affected.

 

Who is affected?

This vulnerability affects ServiceDesk Plus (on-premises) customers of all editions using versions up to 12002.

 

 

How have we fixed it?

We have added additional checks to ensure the filters are properly configured to avoid the authentication bypass vulnerability.

 

 

How to find out if you are affected

Click the Help link in the top-right corner of the ServiceDesk Plus web client, and select About from the drop-down to see your current version. If your current version (all editions) is 12002 and below, your installation is vulnerable.

 

Please follow this forum post for any further updates regarding this vulnerability.

 

What customers should do

Customers who fit the above criteria can upgrade to the latest version (12003) using the appropriate migration path.

 

Alternatively, based on their current version, customers can also upgrade to the appropriate versions mentioned below:

 

Current version

Version or service pack with the fix

Builds 12002 and below

12003

Builds 11310 and below

11311

Builds 11211 and below

11212

Builds 11148 and below

11149

 


Customers of the Professional and Enterprise editions of ServiceDesk Plus who use the Desktop Central agent for asset discovery can refer to this security advisory for information on upgrading Desktop Central.

 

Please read the upgrade instructions carefully before beginning the upgrade. For assistance, write to support@servicedeskplus.com or call us toll-free at +1.888.720.9500.

 

Important note: As always, make a copy of the entire ServiceDesk Plus installation folder before applying the upgrade, and keep the copy in a separate location. If anything goes wrong during the upgrade, you will have this copy as a backup, which will keep all your settings intact. If you're using an MS SQL Server as a back-end database, back up the ServiceDesk Plus database before upgrading. Once the upgrade is successfully completed, remember to delete the backup.

 

We offer our sincerest apologies for any inconvenience this may have caused. If you have any questions or concerns, please reach out to us at support@servicedeskplus.com.

                  New to ADSelfService Plus?