CVE-2024-5586

8.3 HIGH

📋 TL;DR

This vulnerability allows authenticated attackers to execute arbitrary SQL commands through the extranet lockouts report feature in ManageEngine ADAudit Plus. Attackers could potentially read, modify, or delete database information. Organizations using affected versions of ADAudit Plus are at risk.

💻 Affected Systems

Products:
  • ManageEngine ADAudit Plus
Versions: All versions below 8121
Operating Systems: Windows, Linux
Default Config Vulnerable: ⚠️ Yes
Notes: Requires authenticated access to the ADAudit Plus web interface.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete database compromise leading to data exfiltration, privilege escalation, or system takeover via SQL injection to execute arbitrary commands.

🟠

Likely Case

Unauthorized access to sensitive Active Directory audit data, user information, or configuration details stored in the database.

🟢

If Mitigated

Limited impact with proper network segmentation, database permissions, and monitoring in place to detect and block SQL injection attempts.

🌐 Internet-Facing: HIGH
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires valid user credentials to access the vulnerable feature.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 8121

Vendor Advisory: https://www.manageengine.com/products/active-directory-audit/cve-2024-5586.html

Restart Required: Yes

Instructions:

1. Download ADAudit Plus version 8121 or later from ManageEngine website. 2. Backup current installation and database. 3. Run the installer to upgrade. 4. Restart the ADAudit Plus service.

🔧 Temporary Workarounds

Disable Extranet Lockouts Report

all

Temporarily disable the vulnerable report feature until patching can be completed.

Restrict Access to Web Interface

all

Limit network access to ADAudit Plus web interface to trusted IP addresses only.

🧯 If You Can't Patch

  • Implement web application firewall (WAF) with SQL injection protection rules
  • Enforce principle of least privilege for database accounts used by ADAudit Plus

🔍 How to Verify

Check if Vulnerable:

Check ADAudit Plus version in web interface under Help > About or via installation directory.

Check Version:

On Windows: Check 'Program Files\ManageEngine\ADAudit Plus\conf\version.txt' or web interface. On Linux: Check '/opt/ManageEngine/ADAudit Plus/conf/version.txt' or web interface.

Verify Fix Applied:

Confirm version is 8121 or higher and test extranet lockouts report functionality.

📡 Detection & Monitoring

Log Indicators:

  • Unusual SQL queries in database logs
  • Multiple failed login attempts followed by report access
  • Unexpected database schema changes

Network Indicators:

  • SQL injection patterns in HTTP requests to /api/extranetLockoutsReport
  • Unusual database connections from ADAudit Plus server

SIEM Query:

source="ad_audit_logs" AND (url="*extranetLockoutsReport*" AND (query="*SELECT*" OR query="*UNION*" OR query="*INSERT*" OR query="*DELETE*"))

🔗 References

📤 Share & Export