CVE-2022-29535

9.8 CRITICAL

📋 TL;DR

This vulnerability allows attackers to execute arbitrary SQL commands through default reports in Zoho ManageEngine OPManager. It affects all OPManager installations up to version 125588. Successful exploitation could lead to complete system compromise.

💻 Affected Systems

Products:
  • Zoho ManageEngine OPManager
Versions: All versions through 125588
Operating Systems: All supported platforms
Default Config Vulnerable: ⚠️ Yes
Notes: Vulnerability exists in default reports functionality; no special configuration required.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full database compromise leading to data theft, privilege escalation, and remote code execution on the underlying server.

🟠

Likely Case

Unauthorized data access, modification of system configurations, and potential lateral movement within the network.

🟢

If Mitigated

Limited impact with proper input validation and database permissions, potentially only allowing data viewing.

🌐 Internet-Facing: HIGH - SQL injection vulnerabilities are easily exploitable and can lead to complete system takeover.
🏢 Internal Only: HIGH - Even internal attackers can exploit this to gain administrative privileges and compromise the system.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

SQL injection vulnerabilities are well-understood and easily weaponized; authentication may be required but default credentials are often used.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 125589 and later

Vendor Advisory: https://www.manageengine.com/network-monitoring/security-updates/cve-2022-29535.html

Restart Required: Yes

Instructions:

1. Download latest OPManager version from ManageEngine website. 2. Backup current installation. 3. Run installer to upgrade. 4. Restart OPManager services.

🔧 Temporary Workarounds

Disable Default Reports

all

Temporarily disable vulnerable default reports functionality

Navigate to Reports > Default Reports and disable all default reports

Web Application Firewall

all

Deploy WAF with SQL injection protection rules

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate OPManager from critical systems
  • Enable detailed logging and monitoring for SQL injection attempts

🔍 How to Verify

Check if Vulnerable:

Check OPManager version in web interface under Help > About. If version is 125588 or earlier, system is vulnerable.

Check Version:

Check web interface or look for version in installation directory

Verify Fix Applied:

Verify version is 125589 or later and test default reports functionality for SQL injection.

📡 Detection & Monitoring

Log Indicators:

  • Unusual SQL queries in database logs
  • Multiple failed login attempts followed by report access

Network Indicators:

  • Unusual database connections from OPManager server
  • SQL error messages in HTTP responses

SIEM Query:

source="opmanager" AND ("sql" OR "select" OR "union" OR "--") AND status=200

🔗 References

📤 Share & Export