CVE-2021-28959

9.8 CRITICAL

📋 TL;DR

CVE-2021-28959 is a critical directory traversal vulnerability in Zoho ManageEngine Eventlog Analyzer that allows unauthenticated attackers to upload malicious ZIP archives containing path traversal entries. This leads to arbitrary file write and ultimately remote code execution. Organizations running Eventlog Analyzer versions through 12147 are affected.

💻 Affected Systems

Products:
  • Zoho ManageEngine Eventlog Analyzer
Versions: All versions through 12147
Operating Systems: Windows, Linux
Default Config Vulnerable: ⚠️ Yes
Notes: All deployments are vulnerable by default; no special configuration required for exploitation.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise with attacker gaining full administrative control over the server, data exfiltration, lateral movement, and persistent backdoor installation.

🟠

Likely Case

Remote code execution leading to service disruption, credential theft, and installation of malware or ransomware.

🟢

If Mitigated

Attack blocked at network perimeter or detected before exploitation; limited to attempted exploitation logs.

🌐 Internet-Facing: HIGH - Unauthenticated exploit allows direct attack from internet without credentials.
🏢 Internal Only: HIGH - Internal attackers or compromised internal systems can exploit this vulnerability.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: CONFIRMED
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation is straightforward with publicly available proof-of-concept code; requires only ability to upload a specially crafted ZIP file.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Build 12148 and later

Vendor Advisory: https://www.manageengine.com/products/eventlog/features-new.html#release

Restart Required: Yes

Instructions:

1. Download latest version from ManageEngine website. 2. Backup current installation. 3. Stop Eventlog Analyzer service. 4. Install update. 5. Restart service. 6. Verify version is 12148 or higher.

🔧 Temporary Workarounds

Network Access Restriction

all

Restrict access to Eventlog Analyzer web interface to trusted IP addresses only

Disable ZIP Upload

all

Temporarily disable ZIP file upload functionality if not required

🧯 If You Can't Patch

  • Implement strict network segmentation and firewall rules to limit access to Eventlog Analyzer
  • Deploy web application firewall with rules to detect and block directory traversal attempts

🔍 How to Verify

Check if Vulnerable:

Check Eventlog Analyzer version in web interface admin panel or installation directory

Check Version:

On Windows: Check 'ManageEngine\EventLog Analyzer\bin\version.txt' or web interface. On Linux: Check '/opt/ManageEngine/EventLog Analyzer/bin/version.txt'

Verify Fix Applied:

Verify version is 12148 or higher and test ZIP upload functionality with safe test files

📡 Detection & Monitoring

Log Indicators:

  • Unusual ZIP file uploads
  • Path traversal patterns in web logs
  • Unauthenticated access attempts to upload endpoints

Network Indicators:

  • HTTP POST requests with ZIP files to Eventlog Analyzer endpoints
  • Unusual outbound connections from Eventlog Analyzer server

SIEM Query:

source="Eventlog Analyzer" AND (uri="*upload*" OR uri="*zip*" OR uri="*archive*") AND (user_agent="*curl*" OR user_agent="*wget*" OR user_agent="*python*")

🔗 References

📤 Share & Export