CVE-2021-37919

9.8 CRITICAL

📋 TL;DR

This vulnerability allows attackers to upload arbitrary files to Zoho ManageEngine ADManager Plus servers, which can lead to remote code execution. It affects all organizations running ADManager Plus version 7110 and earlier. Attackers can potentially take full control of affected systems.

💻 Affected Systems

Products:
  • Zoho ManageEngine ADManager Plus
Versions: 7110 and prior versions
Operating Systems: Windows, Linux
Default Config Vulnerable: ⚠️ Yes
Notes: All default installations are vulnerable. No special configuration required for exploitation.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise with administrative privileges, data exfiltration, lateral movement within the network, and persistent backdoor installation.

🟠

Likely Case

Remote code execution leading to service disruption, credential theft, and installation of malware or ransomware.

🟢

If Mitigated

Limited impact with proper network segmentation, but still potential for service disruption if exploited.

🌐 Internet-Facing: HIGH - Directly exploitable from the internet without authentication, allowing complete system takeover.
🏢 Internal Only: HIGH - Even internally, this provides a foothold for lateral movement and privilege escalation.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: CONFIRMED
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation is straightforward with publicly available proof-of-concept code. No authentication required.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 7111 and later

Vendor Advisory: https://www.manageengine.com/products/ad-manager/release-notes.html#7111

Restart Required: Yes

Instructions:

1. Download ADManager Plus version 7111 or later from ManageEngine website. 2. Stop the ADManager Plus service. 3. Install the update. 4. Restart the service.

🔧 Temporary Workarounds

Network Access Restriction

all

Restrict network access to ADManager Plus to only trusted IP addresses

Web Application Firewall

all

Implement WAF rules to block file upload attempts to vulnerable endpoints

🧯 If You Can't Patch

  • Immediately isolate the ADManager Plus server from the internet and restrict internal access
  • Implement strict file upload validation and monitoring for suspicious file uploads

🔍 How to Verify

Check if Vulnerable:

Check ADManager Plus version in web interface or installation directory. Versions 7110 and below are vulnerable.

Check Version:

Check web interface at https://[server]:[port]/ or examine installation directory version files

Verify Fix Applied:

Verify version is 7111 or higher after patching. Test file upload functionality to ensure restrictions are in place.

📡 Detection & Monitoring

Log Indicators:

  • Unusual file uploads to ADManager Plus endpoints
  • Web server logs showing POST requests to file upload paths
  • System logs showing new process execution from web directories

Network Indicators:

  • HTTP POST requests to file upload endpoints
  • Outbound connections from ADManager Plus server to unknown IPs

SIEM Query:

source="ADManagerPlus" AND (url="*upload*" OR method="POST") AND status=200

🔗 References

📤 Share & Export