CVE-2021-20078
📋 TL;DR
CVE-2021-20078 is a path traversal vulnerability in ManageEngine OpManager's Spark Gateway component that allows remote attackers to delete arbitrary directories on the operating system. This affects OpManager builds below 125346, potentially leading to complete system compromise. Organizations using vulnerable versions of ManageEngine OpManager are at risk.
💻 Affected Systems
- ManageEngine OpManager
📦 What is this software?
⚠️ Risk & Real-World Impact
Worst Case
Complete system compromise through deletion of critical system directories, leading to permanent data loss, service disruption, and potential follow-on attacks.
Likely Case
Service disruption through deletion of application directories, configuration files, or log directories, causing OpManager and potentially other services to fail.
If Mitigated
Limited impact if proper network segmentation and access controls prevent unauthorized access to the vulnerable component.
🎯 Exploit Status
Exploitation is straightforward with publicly available proof-of-concept code. No authentication required.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Build 125346 and above
Vendor Advisory: https://www.manageengine.com/network-monitoring/security-updates/cve-2021-20078.html
Restart Required: Yes
Instructions:
1. Download the latest version from ManageEngine website. 2. Backup current installation and data. 3. Run the installer to upgrade to build 125346 or later. 4. Restart the OpManager service.
🔧 Temporary Workarounds
Network Access Restriction
allRestrict network access to OpManager's Spark Gateway port (default 8060) to only trusted sources.
# Use firewall rules to restrict access to port 8060
# Example for Linux: iptables -A INPUT -p tcp --dport 8060 -s trusted_ip -j ACCEPT
# Example for Windows: New-NetFirewallRule -DisplayName "Block OpManager Port" -Direction Inbound -LocalPort 8060 -Protocol TCP -Action Block
🧯 If You Can't Patch
- Implement strict network segmentation to isolate OpManager from untrusted networks
- Deploy web application firewall (WAF) rules to block path traversal patterns
🔍 How to Verify
Check if Vulnerable:
Check OpManager build number in the web interface under Help > About, or examine the installation directory for version files.
Check Version:
Check the About page in OpManager web interface or examine %PROGRAMFILES%\ManageEngine\OpManager\conf\opmanager.conf on Windows
Verify Fix Applied:
Verify build number is 125346 or higher after patching, and test that directory deletion attempts via Spark Gateway are blocked.
📡 Detection & Monitoring
Log Indicators:
- Unusual DELETE requests to Spark Gateway endpoints
- Path traversal patterns in web logs (../ sequences)
- File system deletion events in system logs
Network Indicators:
- HTTP requests to port 8060 with path traversal payloads
- Unusual traffic patterns to OpManager's Spark Gateway
SIEM Query:
source="opmanager.logs" AND (uri="*../*" OR method="DELETE") OR (process="java" AND command_line="*spark*" AND file_deletion="*")