CVE-2024-36514

8.3 HIGH

📋 TL;DR

This vulnerability allows authenticated attackers to execute arbitrary SQL commands through the file summary option in ManageEngine ADAudit Plus. Attackers could potentially read, modify, or delete database contents. Organizations running ADAudit Plus versions below 8000 are affected.

💻 Affected Systems

Products:
  • ManageEngine ADAudit Plus
Versions: All versions below 8000
Operating Systems: Windows, Linux
Default Config Vulnerable: ⚠️ Yes
Notes: Requires authenticated access to the ADAudit Plus web interface. The vulnerability exists in the file summary functionality.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete database compromise leading to data exfiltration, privilege escalation, or system takeover via SQL injection to execute arbitrary commands.

🟠

Likely Case

Unauthorized data access and potential privilege escalation within the ADAudit Plus application database.

🟢

If Mitigated

Limited impact with proper network segmentation, strong authentication controls, and monitoring of database queries.

🌐 Internet-Facing: HIGH if ADAudit Plus web interface is exposed to the internet, as authenticated SQL injection can lead to full system compromise.
🏢 Internal Only: HIGH as authenticated users (including compromised accounts) can exploit this vulnerability to gain elevated privileges.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires authenticated access but SQL injection vulnerabilities are typically easy to exploit once identified.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 8000 and above

Vendor Advisory: https://www.manageengine.com/products/active-directory-audit/cve-2024-36514.html

Restart Required: Yes

Instructions:

1. Download ADAudit Plus version 8000 or later from ManageEngine website. 2. Backup current installation and database. 3. Run the installer to upgrade. 4. Restart the ADAudit Plus service.

🔧 Temporary Workarounds

Network Segmentation

all

Restrict access to ADAudit Plus web interface to only trusted administrative networks

Authentication Hardening

all

Implement strong authentication policies including MFA and limit administrative accounts

🧯 If You Can't Patch

  • Implement web application firewall (WAF) with SQL injection protection rules
  • Monitor and audit all database queries from ADAudit Plus application

🔍 How to Verify

Check if Vulnerable:

Check ADAudit Plus version in web interface under Help > About or via installed program details

Check Version:

On Windows: Check installed programs list. On Linux: Check installation directory version files.

Verify Fix Applied:

Verify version is 8000 or higher and test file summary functionality with SQL injection test payloads

📡 Detection & Monitoring

Log Indicators:

  • Unusual SQL queries in database logs
  • Multiple failed authentication attempts followed by file summary access
  • Unexpected database schema changes

Network Indicators:

  • SQL injection patterns in HTTP requests to /api/fileSummary endpoints
  • Unusual database connection patterns from ADAudit Plus server

SIEM Query:

source="ad_audit_logs" AND (url="*fileSummary*" AND (query="*SELECT*" OR query="*UNION*" OR query="*INSERT*" OR query="*DELETE*"))

🔗 References

📤 Share & Export