CVE-2023-47211

9.1 CRITICAL

📋 TL;DR

A directory traversal vulnerability in ManageEngine OpManager's uploadMib functionality allows attackers to create arbitrary files on the system by sending specially crafted HTTP requests with malicious MiB files. This affects ManageEngine OpManager version 12.7.258, potentially enabling remote code execution or system compromise.

💻 Affected Systems

Products:
  • ManageEngine OpManager
Versions: 12.7.258
Operating Systems: Windows, Linux
Default Config Vulnerable: ⚠️ Yes
Notes: All installations of the affected version are vulnerable by default.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Remote code execution leading to complete system compromise, data exfiltration, or ransomware deployment.

🟠

Likely Case

Arbitrary file creation enabling privilege escalation, persistence mechanisms, or sensitive data access.

🟢

If Mitigated

Limited impact with proper network segmentation and file system permissions preventing critical file access.

🌐 Internet-Facing: HIGH - Exploitable via HTTP requests without authentication, making internet-facing instances extremely vulnerable.
🏢 Internal Only: HIGH - Even internally, the vulnerability can be exploited by any network-accessible attacker.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires sending a crafted HTTP request with a malicious MiB file, which is straightforward for attackers.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 12.7.259 or later

Vendor Advisory: https://www.manageengine.com/itom/advisory/cve-2023-47211.html

Restart Required: Yes

Instructions:

1. Download the latest version from ManageEngine's website. 2. Stop the OpManager service. 3. Install the update. 4. Restart the service.

🔧 Temporary Workarounds

Disable uploadMib functionality

all

Temporarily disable the vulnerable uploadMib feature until patching is complete.

Modify OpManager configuration to restrict access to uploadMib endpoints

Network segmentation

all

Restrict network access to OpManager instances to trusted IP addresses only.

Configure firewall rules to allow only specific IPs to access OpManager ports

🧯 If You Can't Patch

  • Implement strict network access controls to limit exposure to trusted sources only.
  • Monitor for suspicious file creation activities and HTTP requests to uploadMib endpoints.

🔍 How to Verify

Check if Vulnerable:

Check if OpManager version is 12.7.258 via the web interface or installation directory.

Check Version:

Check the version in the OpManager web interface under Help > About or examine the installation directory.

Verify Fix Applied:

Verify the version is updated to 12.7.259 or later and test uploadMib functionality with safe files.

📡 Detection & Monitoring

Log Indicators:

  • HTTP requests to uploadMib endpoints with unusual file paths or extensions
  • File creation events in unexpected directories

Network Indicators:

  • HTTP POST requests to /uploadMib with suspicious payloads
  • Unusual outbound connections from OpManager server

SIEM Query:

source="opmanager" AND (url="*uploadMib*" AND (path="*../*" OR file_extension!=".mib"))

🔗 References

📤 Share & Export