CVE-2021-37539

9.8 CRITICAL

📋 TL;DR

This vulnerability allows attackers to upload arbitrary files without restrictions in Zoho ManageEngine ADManager Plus, leading to remote code execution. It affects all organizations running ADManager Plus versions before 7111. Attackers can compromise the entire system if successfully exploited.

💻 Affected Systems

Products:
  • Zoho ManageEngine ADManager Plus
Versions: All versions before 7111
Operating Systems: Windows, Linux
Default Config Vulnerable: ⚠️ Yes
Notes: All default installations are vulnerable. No special configuration required for exploitation.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise with administrative privileges, data exfiltration, lateral movement across the network, and persistent backdoor installation.

🟠

Likely Case

Remote code execution leading to service disruption, credential theft, and installation of malware or ransomware.

🟢

If Mitigated

Limited impact with proper network segmentation, file upload restrictions, and monitoring in place.

🌐 Internet-Facing: HIGH - Directly exploitable from the internet if the application is exposed.
🏢 Internal Only: HIGH - Even internally, this provides a foothold for lateral movement and privilege escalation.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: CONFIRMED
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation is straightforward with publicly available proof-of-concept code. No authentication required.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 7111

Vendor Advisory: https://www.manageengine.com/products/ad-manager/release-notes.html#7111

Restart Required: Yes

Instructions:

1. Download ADManager Plus version 7111 or later from ManageEngine website. 2. Stop the ADManager Plus service. 3. Install the update. 4. Restart the service. 5. Verify the version is 7111 or higher.

🔧 Temporary Workarounds

Network Segmentation

all

Restrict network access to ADManager Plus to only trusted IP addresses and networks.

Web Application Firewall Rules

all

Implement WAF rules to block file upload requests to vulnerable endpoints.

🧯 If You Can't Patch

  • Immediately isolate the ADManager Plus server from the internet and restrict internal access to only necessary users.
  • Implement strict file upload validation and monitoring for any suspicious file upload activities.

🔍 How to Verify

Check if Vulnerable:

Check the ADManager Plus version in the web interface under Help > About. If version is below 7111, the system is vulnerable.

Check Version:

Check via web interface: Help > About, or on Windows: Check installed programs list, or on Linux: Check the installation directory for version files.

Verify Fix Applied:

After patching, verify the version shows 7111 or higher in the About section and test that file upload functionality is properly restricted.

📡 Detection & Monitoring

Log Indicators:

  • Unusual file uploads to ADManager Plus endpoints
  • Unexpected process creation from ADManager Plus service
  • Access to sensitive files or directories

Network Indicators:

  • HTTP POST requests to file upload endpoints with suspicious file extensions
  • Outbound connections from ADManager Plus server to unknown external IPs

SIEM Query:

source="ADManagerPlus" AND (url="*upload*" OR url="*file*" OR process="cmd.exe" OR process="powershell.exe")

🔗 References

📤 Share & Export