Schedule demo

CVE-2018-15168

SQL Injection vulnerability using the resids parameter.


Vulnerability Details
ImpactCVSS V3 rating:
Reported18 July 2018
Fixed25 July 2018
Affected BuildsTill Build 13810
Fixed inBuild 13820
OverviewSQL Injection vulnerability using the resids parameter in the Edit Display Name page
Recommended FixUpgrade to Applications Manager Version 13820 or above.

Description

A SQL Injection vulnerability exists in the Zoho ManageEngine Applications Manager via the resids parameter in a /editDisplaynames.do?method=editDisplaynames GET request.

We recommend that you upgrade to Applications Manager Version 13820 and above to fix this issue.


Source and Acknowledgements

Find out more about CVE-2018-15168 from the CVE dictionary and NIST NVD.

Other Resources: https://github.com/x-f1v3/ForCve/issues/2

Need Help?

For clarification or corrections please contact our support team or email us at appmanager-support@manageengine.com

Loved by customers all over the world

"Standout Tool With Extensive Monitoring Capabilities"

It allows us to track crucial metrics such as response times, resource utilization, error rates, and transaction performance. The real-time monitoring alerts promptly notify us of any issues or anomalies, enabling us to take immediate action.

Reviewer Role: Research and Development

carlos-rivero
"I like Applications Manager because it helps us to detect issues present in our servers and SQL databases."
Carlos Rivero

Tech Support Manager, Lexmark

Trusted by thousands of leading businesses globally