Schedule demo


SQL Injection attack possible in 'haid' parameter of the '/' URL

Vulnerability Details
Impact CVSS V3 rating: 8.1 HIGH
Fixed 30 April 2020
Affected Builds Till version 14650
Fixed in Build 14660 and above
Overview SQL Injection attack possible in 'haid' parameter of the '/' URL.
Recommended Fix Upgrade Applications Manager to version 14660 or above.

Description- Security Update - CVE-2017-11738 Database

In ManageEngine Application Manager 13.1 Build 13100, the 'haid' parameter of the '/' module is vulnerable to a Time-based Blind SQL Injection attack.

We recommend you to upgrade Applications Manager to version 14660 or above to fix this issue.

Source and Acknowledgements

Find out more about CVE-2017-11738 from CVE Directory and NIST NVD.

Reported by:
Elvin Hayes Gentiles of Trustwave SpiderLabs

Need Help?

For clarification or corrections please contact our support team or email us at

Loved by customers all over the world

"Standout Tool With Extensive Monitoring Capabilities"

It allows us to track crucial metrics such as response times, resource utilization, error rates, and transaction performance. The real-time monitoring alerts promptly notify us of any issues or anomalies, enabling us to take immediate action.

Reviewer Role: Research and Development

"I like Applications Manager because it helps us to detect issues present in our servers and SQL databases."
Carlos Rivero

Tech Support Manager, Lexmark

Trusted by over 6000+ businesses globally