CVE-2021-43296

7.5 HIGH

📋 TL;DR

This vulnerability allows attackers to perform Server-Side Request Forgery (SSRF) attacks through the ActionExecutor component in Zoho ManageEngine SupportCenter Plus. Attackers can make the vulnerable server send requests to internal systems, potentially accessing sensitive data or services. Organizations running SupportCenter Plus versions before 11016 are affected.

💻 Affected Systems

Products:
  • Zoho ManageEngine SupportCenter Plus
Versions: All versions before 11016
Operating Systems: All supported platforms
Default Config Vulnerable: ⚠️ Yes
Notes: All default installations are vulnerable if not patched to version 11016 or later.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could access internal services, sensitive data, or pivot to other systems, potentially leading to data breaches or network compromise.

🟠

Likely Case

Attackers scan internal networks, access metadata services, or interact with internal APIs to gather information or perform limited actions.

🟢

If Mitigated

With proper network segmentation and egress filtering, impact is limited to information disclosure from accessible internal services.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

SSRF vulnerabilities are commonly exploited and tools exist for automated exploitation.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 11016

Vendor Advisory: https://www.manageengine.com/products/support-center/readme.html#11016

Restart Required: Yes

Instructions:

1. Download SupportCenter Plus version 11016 or later from ManageEngine website. 2. Backup current installation. 3. Stop the SupportCenter Plus service. 4. Install the update. 5. Restart the service.

🔧 Temporary Workarounds

Network Segmentation

all

Restrict outbound network access from SupportCenter Plus servers to only necessary services

Web Application Firewall

all

Configure WAF rules to block SSRF patterns in requests to ActionExecutor

🧯 If You Can't Patch

  • Implement strict network egress filtering to limit what internal services the server can access
  • Monitor for unusual outbound requests from SupportCenter Plus servers

🔍 How to Verify

Check if Vulnerable:

Check SupportCenter Plus version in admin interface or installation directory

Check Version:

Check Admin → About in web interface or examine version files in installation directory

Verify Fix Applied:

Confirm version is 11016 or later and test SSRF attempts are blocked

📡 Detection & Monitoring

Log Indicators:

  • Unusual outbound HTTP requests from SupportCenter Plus server
  • Requests to internal IP ranges or metadata services

Network Indicators:

  • HTTP requests from SupportCenter Plus to unexpected internal destinations
  • Patterns of requests to known SSRF targets

SIEM Query:

source="supportcenter-plus" AND (dest_ip=169.254.169.254 OR dest_ip=10.* OR dest_ip=192.168.* OR dest_ip=172.16.*)

🔗 References

📤 Share & Export