CVE-2023-49332

8.3 HIGH

📋 TL;DR

This SQL injection vulnerability in Zoho ManageEngine ADAudit Plus allows attackers to execute arbitrary SQL commands when adding file shares. Affected organizations running versions below 7271 could have their Active Directory audit databases compromised. The vulnerability enables potential data theft, privilege escalation, or system takeover.

💻 Affected Systems

Products:
  • Zoho ManageEngine ADAudit Plus
Versions: All versions below 7271
Operating Systems: Windows Server (primary deployment platform)
Default Config Vulnerable: ⚠️ Yes
Notes: Affects the file share management functionality specifically. Requires access to the ADAudit Plus web interface.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete compromise of the ADAudit Plus database leading to Active Directory credential theft, lateral movement across the network, and full domain compromise.

🟠

Likely Case

Data exfiltration from the ADAudit Plus database including audit logs, configuration data, and potentially cached credentials.

🟢

If Mitigated

Limited impact if proper network segmentation, database permissions, and input validation controls are in place.

🌐 Internet-Facing: HIGH if ADAudit Plus web interface is exposed to the internet, as SQL injection can be exploited remotely.
🏢 Internal Only: HIGH as authenticated users or attackers who gain internal access can exploit this vulnerability to escalate privileges.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

SQL injection vulnerabilities are typically easy to exploit with basic tools. Requires authenticated access to the file share management interface.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 7271

Vendor Advisory: https://www.manageengine.com/products/active-directory-audit/sqlfix-7271.html

Restart Required: Yes

Instructions:

1. Download build 7271 from ManageEngine website. 2. Stop ADAudit Plus service. 3. Run the installer. 4. Restart the service. 5. Verify version in web interface.

🔧 Temporary Workarounds

Disable file share management

all

Temporarily disable the vulnerable file share management functionality until patching can be completed.

Network access restrictions

all

Restrict access to ADAudit Plus web interface to only authorized administrative networks.

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate ADAudit Plus from critical systems
  • Enable detailed SQL query logging and monitor for injection patterns

🔍 How to Verify

Check if Vulnerable:

Check ADAudit Plus version in web interface: Settings > About > Build Number. If below 7271, vulnerable.

Check Version:

Not applicable - check via web interface or Windows Services console

Verify Fix Applied:

After patching, verify version shows 7271 or higher in Settings > About.

📡 Detection & Monitoring

Log Indicators:

  • Unusual SQL queries in database logs
  • Multiple failed login attempts followed by file share operations
  • SQL error messages containing injection patterns

Network Indicators:

  • Unusual database connections from ADAudit Plus server
  • SQL injection patterns in HTTP POST requests to file share endpoints

SIEM Query:

source="aduit_logs" AND ("sql" OR "injection" OR "UNION" OR "SELECT" OR "FROM")

🔗 References

📤 Share & Export