CVE-2024-0253

8.3 HIGH

📋 TL;DR

This vulnerability allows authenticated attackers to execute arbitrary SQL commands in ManageEngine ADAudit Plus. Attackers with valid credentials can potentially access, modify, or delete database information. Organizations using ADAudit Plus versions 7270 and below are affected.

💻 Affected Systems

Products:
  • ManageEngine ADAudit Plus
Versions: 7270 and below
Operating Systems: Windows, Linux
Default Config Vulnerable: ⚠️ Yes
Notes: Requires authenticated access to the Graph-Data functionality

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete database compromise leading to data exfiltration, privilege escalation, or system takeover

🟠

Likely Case

Unauthorized data access and potential data manipulation

🟢

If Mitigated

Limited impact with proper authentication controls and network segmentation

🌐 Internet-Facing: HIGH if exposed to internet with authenticated users
🏢 Internal Only: HIGH due to authenticated SQL injection accessible to internal users

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Requires authenticated access but SQL injection is typically straightforward to exploit

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 7271

Vendor Advisory: https://www.manageengine.com/products/active-directory-audit/sqlfix-7271.html

Restart Required: Yes

Instructions:

1. Download version 7271 from ManageEngine website. 2. Backup current installation. 3. Run the upgrade installer. 4. Restart the ADAudit Plus service.

🔧 Temporary Workarounds

Restrict Access to Graph-Data Endpoint

all

Limit network access to the vulnerable Graph-Data functionality

Implement Web Application Firewall

all

Deploy WAF with SQL injection protection rules

🧯 If You Can't Patch

  • Implement strict authentication controls and monitor for suspicious SQL queries
  • Segment network to isolate ADAudit Plus from critical systems

🔍 How to Verify

Check if Vulnerable:

Check ADAudit Plus version in web interface or installation directory

Check Version:

Check Help > About in web interface or examine build7270.txt in installation directory

Verify Fix Applied:

Verify version is 7271 or higher in web interface

📡 Detection & Monitoring

Log Indicators:

  • Unusual SQL queries in database logs
  • Multiple failed authentication attempts followed by Graph-Data access

Network Indicators:

  • Unusual traffic patterns to Graph-Data endpoints
  • SQL error messages in HTTP responses

SIEM Query:

source="ad_audit_logs" AND (event="sql_error" OR uri="/Graph-Data" AND status=500)

🔗 References

📤 Share & Export