CVE-2024-0253
📋 TL;DR
This vulnerability allows authenticated attackers to execute arbitrary SQL commands in ManageEngine ADAudit Plus. Attackers with valid credentials can potentially access, modify, or delete database information. Organizations using ADAudit Plus versions 7270 and below are affected.
💻 Affected Systems
- ManageEngine ADAudit Plus
📦 What is this software?
⚠️ Risk & Real-World Impact
Worst Case
Complete database compromise leading to data exfiltration, privilege escalation, or system takeover
Likely Case
Unauthorized data access and potential data manipulation
If Mitigated
Limited impact with proper authentication controls and network segmentation
🎯 Exploit Status
Requires authenticated access but SQL injection is typically straightforward to exploit
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: 7271
Vendor Advisory: https://www.manageengine.com/products/active-directory-audit/sqlfix-7271.html
Restart Required: Yes
Instructions:
1. Download version 7271 from ManageEngine website. 2. Backup current installation. 3. Run the upgrade installer. 4. Restart the ADAudit Plus service.
🔧 Temporary Workarounds
Restrict Access to Graph-Data Endpoint
allLimit network access to the vulnerable Graph-Data functionality
Implement Web Application Firewall
allDeploy WAF with SQL injection protection rules
🧯 If You Can't Patch
- Implement strict authentication controls and monitor for suspicious SQL queries
- Segment network to isolate ADAudit Plus from critical systems
🔍 How to Verify
Check if Vulnerable:
Check ADAudit Plus version in web interface or installation directory
Check Version:
Check Help > About in web interface or examine build7270.txt in installation directory
Verify Fix Applied:
Verify version is 7271 or higher in web interface
📡 Detection & Monitoring
Log Indicators:
- Unusual SQL queries in database logs
- Multiple failed authentication attempts followed by Graph-Data access
Network Indicators:
- Unusual traffic patterns to Graph-Data endpoints
- SQL error messages in HTTP responses
SIEM Query:
source="ad_audit_logs" AND (event="sql_error" OR uri="/Graph-Data" AND status=500)