CVE-2024-36034

8.3 HIGH

📋 TL;DR

This vulnerability allows authenticated attackers to execute arbitrary SQL commands through the aggregate reports' search option in ManageEngine ADAudit Plus. Attackers could potentially access, modify, or delete sensitive Active Directory audit data. Organizations using ADAudit Plus versions below 8003 are affected.

💻 Affected Systems

Products:
  • Zohocorp ManageEngine ADAudit Plus
Versions: All versions below 8003
Operating Systems: Windows, Linux
Default Config Vulnerable: ⚠️ Yes
Notes: Requires authenticated access to the ADAudit Plus web interface. The vulnerability exists in the aggregate reports feature.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete compromise of the ADAudit Plus database, allowing data exfiltration, privilege escalation, and potential lateral movement to connected Active Directory environments.

🟠

Likely Case

Unauthorized access to sensitive audit logs, user data extraction, and potential data manipulation affecting compliance reporting.

🟢

If Mitigated

Limited impact if proper network segmentation, database permissions, and monitoring are in place, though data exposure risk remains.

🌐 Internet-Facing: MEDIUM - While authentication is required, exposed ADAudit Plus instances could be targeted by credential stuffing or insider threats.
🏢 Internal Only: HIGH - Authenticated users (including compromised accounts) can exploit this to access sensitive audit data and potentially escalate privileges.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Requires authenticated access but SQL injection is typically straightforward to exploit once authenticated.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 8003

Vendor Advisory: https://www.manageengine.com/products/active-directory-audit/sqlfix-8003.html

Restart Required: Yes

Instructions:

1. Download ADAudit Plus build 8003 from ManageEngine website. 2. Stop ADAudit Plus service. 3. Backup current installation. 4. Install the update. 5. Restart ADAudit Plus service.

🔧 Temporary Workarounds

Restrict Access to Aggregate Reports

all

Temporarily disable or restrict access to the aggregate reports feature for non-essential users.

Implement Web Application Firewall

all

Deploy WAF rules to block SQL injection patterns targeting the aggregate reports endpoint.

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate ADAudit Plus from critical systems
  • Enforce principle of least privilege for ADAudit Plus user accounts and database permissions

🔍 How to Verify

Check if Vulnerable:

Check ADAudit Plus version in web interface (Help > About) or installation directory. If version is below 8003, system is vulnerable.

Check Version:

On Windows: Check 'C:\Program Files\ManageEngine\ADAudit Plus\conf\version.info'. On Linux: Check '/opt/ManageEngine/ADAudit Plus/conf/version.info'

Verify Fix Applied:

Verify version is 8003 or higher in About page. Test aggregate reports search functionality with SQL injection test payloads (in safe environment).

📡 Detection & Monitoring

Log Indicators:

  • Unusual SQL queries in database logs
  • Multiple failed login attempts followed by aggregate reports access
  • Long or malformed search parameters in web logs

Network Indicators:

  • Unusual database connection patterns from ADAudit Plus server
  • Large data transfers from ADAudit Plus database

SIEM Query:

source="ad_audit_logs" AND (event="SQL_ERROR" OR uri="/aggregatereports" AND (param CONTAINS "' OR " OR "--" OR ";"))

🔗 References

📤 Share & Export