CVE-2024-36485

8.3 HIGH

📋 TL;DR

This SQL injection vulnerability in ManageEngine ADAudit Plus allows attackers to execute arbitrary SQL commands through the Technician reports option. Organizations using affected versions are at risk of data theft, modification, or deletion. The vulnerability requires authentication but can be exploited by any user with Technician role access.

💻 Affected Systems

Products:
  • ManageEngine ADAudit Plus
Versions: All versions below 8121
Operating Systems: Windows, Linux
Default Config Vulnerable: ⚠️ Yes
Notes: Vulnerability exists in default installation. Requires user with Technician role privileges to exploit.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete compromise of the database including extraction of sensitive Active Directory audit data, credential theft, privilege escalation to domain admin, and potential lateral movement across the network.

🟠

Likely Case

Unauthorized access to audit logs, sensitive directory information, and potential data manipulation or deletion of audit records.

🟢

If Mitigated

Limited impact if proper network segmentation, database permissions, and input validation controls are in place, though some data exposure may still occur.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

SQL injection vulnerabilities are typically easy to exploit with basic tools. Requires authenticated access with Technician role.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 8121

Vendor Advisory: https://www.manageengine.com/products/active-directory-audit/cve-2024-36485.html

Restart Required: Yes

Instructions:

1. Download ADAudit Plus build 8121 or later from ManageEngine website. 2. Backup current installation. 3. Run the installer to upgrade. 4. Restart the ADAudit Plus service.

🔧 Temporary Workarounds

Restrict Technician Role Access

all

Temporarily remove Technician role from non-essential users until patching can be completed.

Network Segmentation

all

Isolate ADAudit Plus server from critical systems and restrict database access.

🧯 If You Can't Patch

  • Implement strict input validation at web application firewall level
  • Monitor and alert on unusual SQL queries or database access patterns

🔍 How to Verify

Check if Vulnerable:

Check ADAudit Plus version in web interface under Help > About or via installation directory properties.

Check Version:

On Windows: Check Program Files\ManageEngine\ADAudit Plus\bin\version.txt. On Linux: Check /opt/ManageEngine/ADAudit Plus/bin/version.txt

Verify Fix Applied:

Confirm version is 8121 or higher and test Technician reports functionality for SQL injection attempts.

📡 Detection & Monitoring

Log Indicators:

  • Unusual SQL queries in database logs
  • Multiple failed Technician report generation attempts
  • Suspicious user activity from Technician accounts

Network Indicators:

  • Unusual database connection patterns
  • SQL error messages in HTTP responses

SIEM Query:

source="ad_audit_logs" AND (event_type="report_generation" AND (query="%' OR '%'='%" OR query="%' UNION SELECT%"))

🔗 References

📤 Share & Export