ADManager Plus builds have been reported to suffer unrestricted file upload, path traversal and broken authentication vulnerabilities, leading to potential unauthenticated remote code execution. For more information on these vulnerabilities and their respective CVE IDs, please refer to our ADManager Plus 7111 release notes here. This article explains these issues and the steps to follow to secure your ADManager Plus instance.
What is the issue?
Unrestricted file upload and path traversal vulnerabilities in ManageEngine ADManager Plus allow unauthenticated remote code execution by an attacker. As a result, an attacker can execute any code of their choice on a remote machine with administrator/system privileges, without authentication.
Whom does it affect?
All users using ADManager Plus versions below 7111.
What is the severity level of this vulnerability?
This is a critical vulnerability.
How to prevent my instance from getting compromised?
To prevent your ADManager Plus installation from getting compromised, you can either upgrade the product to the latest build, which we strongly recommend, or follow the mitigation steps.
Option 1: Update your ADManager Plus:
To update your ADManager Plus instance, download the service pack from this page and follow the instructions given on the page to install the new service pack.
Option 2: Follow these Mitigation steps:
Step 1: Disable SAML Authentication. To do this, login to your ADManager Plus console and go to Delegation → Configuration → Logon Settings → Single Sign On. Disable the 'Enable Single Sign-on with Active Directory' option and click Save.
Step 2: Stop ADManager Plus.
Step 3: Take a backup of web.xml from ADManager Plus\webapps\adsm\WEB-INF.
Step 4: Add the below snippet in web.xml before </web-app>
Step 5: Start ADManager Plus.
If you need any additional information or if you face any issues in performing the recommended steps, please write to us at support@admanagerplus.com. You can also call us at +1-844-245-1108 (toll-free).