CVE-2021-20078

9.1 CRITICAL

📋 TL;DR

CVE-2021-20078 is a path traversal vulnerability in ManageEngine OpManager's Spark Gateway component that allows remote attackers to delete arbitrary directories on the operating system. This affects OpManager builds below 125346, potentially leading to complete system compromise. Organizations using vulnerable versions of ManageEngine OpManager are at risk.

💻 Affected Systems

Products:
  • ManageEngine OpManager
Versions: All builds below 125346
Operating Systems: Windows, Linux
Default Config Vulnerable: ⚠️ Yes
Notes: Affects the Spark Gateway component specifically. All deployments with vulnerable versions are affected regardless of configuration.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise through deletion of critical system directories, leading to permanent data loss, service disruption, and potential follow-on attacks.

🟠

Likely Case

Service disruption through deletion of application directories, configuration files, or log directories, causing OpManager and potentially other services to fail.

🟢

If Mitigated

Limited impact if proper network segmentation and access controls prevent unauthorized access to the vulnerable component.

🌐 Internet-Facing: HIGH - The vulnerability is remotely exploitable without authentication, making internet-facing instances immediate targets.
🏢 Internal Only: HIGH - Even internally, the vulnerability allows directory deletion which can disrupt critical business operations.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: CONFIRMED
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation is straightforward with publicly available proof-of-concept code. No authentication required.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Build 125346 and above

Vendor Advisory: https://www.manageengine.com/network-monitoring/security-updates/cve-2021-20078.html

Restart Required: Yes

Instructions:

1. Download the latest version from ManageEngine website. 2. Backup current installation and data. 3. Run the installer to upgrade to build 125346 or later. 4. Restart the OpManager service.

🔧 Temporary Workarounds

Network Access Restriction

all

Restrict network access to OpManager's Spark Gateway port (default 8060) to only trusted sources.

# Use firewall rules to restrict access to port 8060
# Example for Linux: iptables -A INPUT -p tcp --dport 8060 -s trusted_ip -j ACCEPT
# Example for Windows: New-NetFirewallRule -DisplayName "Block OpManager Port" -Direction Inbound -LocalPort 8060 -Protocol TCP -Action Block

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate OpManager from untrusted networks
  • Deploy web application firewall (WAF) rules to block path traversal patterns

🔍 How to Verify

Check if Vulnerable:

Check OpManager build number in the web interface under Help > About, or examine the installation directory for version files.

Check Version:

Check the About page in OpManager web interface or examine %PROGRAMFILES%\ManageEngine\OpManager\conf\opmanager.conf on Windows

Verify Fix Applied:

Verify build number is 125346 or higher after patching, and test that directory deletion attempts via Spark Gateway are blocked.

📡 Detection & Monitoring

Log Indicators:

  • Unusual DELETE requests to Spark Gateway endpoints
  • Path traversal patterns in web logs (../ sequences)
  • File system deletion events in system logs

Network Indicators:

  • HTTP requests to port 8060 with path traversal payloads
  • Unusual traffic patterns to OpManager's Spark Gateway

SIEM Query:

source="opmanager.logs" AND (uri="*../*" OR method="DELETE") OR (process="java" AND command_line="*spark*" AND file_deletion="*")

🔗 References

📤 Share & Export