Direct Inward Dialing: +1 408 916 9393
ADManager Plus builds have been reported to suffer unrestricted file upload, path traversal and broken authentication vulnerabilities, leading to potential unauthenticated remote code execution. For more information on these vulnerabilities and their respective CVE IDs, please refer to our ADManager Plus 7111 release notes here. This article explains these issues and the steps to follow to secure your ADManager Plus instance.
Unrestricted file upload and path traversal vulnerabilities in ManageEngine ADManager Plus allow unauthenticated remote code execution by an attacker. As a result, an attacker can execute any code of their choice on a remote machine with administrator/system privileges, without authentication.
All users using ADManager Plus versions below 7111.
This is a critical vulnerability.
To prevent your ADManager Plus installation from getting compromised, you can either upgrade the product to the latest build, which we strongly recommend, or follow the mitigation steps.
To update your ADManager Plus instance, download the service pack from this page and follow the instructions given on the page to install the new service pack.
Step 1: Disable SAML Authentication. To do this, login to your ADManager Plus console and go to Delegation > Configuration > Logon Settings > Single Sign On. Disable the 'Enable Single Sign-on with Active Directory' option and click Save.
Step 2: Stop ADManager Plus.
Step 3: Take a backup of web.xml from ADManager Plus\webapps\adsm\WEB-INF.
Step 4: Add the below snippet in web.xml before </web-app>
<security-constraint>
<web-resource-collection>
<url-pattern>/WC/*</url-pattern>
<url-pattern>/RestAPI/SmartCard/*</url-pattern>
<url-pattern>/ADMPSmartCardConfig.do</url-pattern>
<url-pattern>/RestAPI/WC/SmartCard/*</url-pattern>
<url-pattern>/SmartCardConfig.do</url-pattern>
<url-pattern>/RestAPI/WC/NotificationTemplate/attachFiles/*</url-pattern>
<url-pattern>/ModifyUserPhoto.do</url-pattern>
<url-pattern>/RestAPI/WC/PasswordExpiryNotification/*</url-pattern>
<url-pattern>/RestAPI/WC/Personalize/*</url-pattern>
<url-pattern>/RestAPI/WC/License/*</url-pattern>
<url-pattern>/ChangeDBAPI.do</url-pattern>
<url-pattern>/servlet/ProductConfig/*</url-pattern>
<url-pattern>*.jsp</url-pattern>
</web-resource-collection>
<auth-constraint />
</security-constraint>
Step 5: Start ADManager Plus.
The above mitigation steps might impact these functionalities in your instance:
Select a language to translate the contents of this web page:
Fill this form, and we'll contact you rightaway.
Our technical support team will get in touch with you at the earliest."