CVE-2024-5678

4.7 MEDIUM

📋 TL;DR

This vulnerability allows authenticated administrators in Zohocorp ManageEngine Applications Manager to execute arbitrary SQL commands through the Create Monitor feature. Attackers with admin credentials can potentially read, modify, or delete database content. Only administrators with access to the vulnerable feature are affected.

💻 Affected Systems

Products:
  • Zohocorp ManageEngine Applications Manager
Versions: Versions 170900 and below
Operating Systems: All supported platforms
Default Config Vulnerable: ⚠️ Yes
Notes: Requires authenticated administrator access to the Create Monitor feature.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete database compromise including data exfiltration, data manipulation, or potential privilege escalation to underlying operating system.

🟠

Likely Case

Unauthorized data access, configuration changes, or denial of service affecting application functionality.

🟢

If Mitigated

Limited impact due to proper access controls, network segmentation, and monitoring preventing successful exploitation.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires admin credentials but SQL injection is straightforward once authenticated.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Version 170901 or later

Vendor Advisory: https://www.manageengine.com/products/applications_manager/security-updates/security-updates-cve-2024-5678.html

Restart Required: Yes

Instructions:

1. Download latest version from ManageEngine website. 2. Backup current installation. 3. Run installer to upgrade. 4. Restart Applications Manager service.

🔧 Temporary Workarounds

Restrict Admin Access

all

Limit administrator accounts to only trusted personnel and implement multi-factor authentication.

Network Segmentation

all

Place Applications Manager behind firewall with restricted access to database servers.

🧯 If You Can't Patch

  • Implement strict access controls and monitor all admin activity
  • Deploy web application firewall with SQL injection protection rules

🔍 How to Verify

Check if Vulnerable:

Check Applications Manager version in admin console or installation directory.

Check Version:

Check Help > About in Applications Manager web interface

Verify Fix Applied:

Verify version is 170901 or higher in admin console.

📡 Detection & Monitoring

Log Indicators:

  • Unusual SQL queries in database logs
  • Multiple failed login attempts followed by admin access
  • Unexpected monitor creation events

Network Indicators:

  • Unusual database connections from Applications Manager server
  • SQL error messages in HTTP responses

SIEM Query:

source="applications_manager" AND (event="monitor_creation" OR sql_error*)

🔗 References

📤 Share & Export