ManageEngine OpManager Remote Code Execution

Discussion in 'News Aggregator' started by Packet Storm, 17 Sep 2015.

  1. Packet Storm

    Packet Storm Guest

    This Metasploit module exploits a default credential vulnerability in ManageEngine OpManager, where a default hidden account "IntegrationUser" with administrator privileges exists. The account has a default password of "plugin" which can not be reset through the user interface. By log-in and abusing the default administrator's SQL query functionality, it's possible to write a WAR payload to disk and trigger an automatic deployment of this payload. This Metasploit module has been tested successfully on OpManager v11.5 and v11.6 for Windows.

    Continue reading...
     

Share This Page

Loading...