Schedule demo
 
 

CVE-2019-15106

Unauthenticated Remote Command Execution in Applications Manager Plugin


Vulnerability Details
Impact CVSS V3 rating: 9.8 CRITICAL
Fixed 20 August 2019
Affected Builds Till Build 14300
Fixed in Build 14310
Overview Unauthenticated Remote Command Execution in Applications Manager Plugin.
Recommended Fix Upgrade to Applications Manager Plugin to version 14310 or above.

Description- Security Update - CVE-2019-15106 Database

An issue was discovered in Zoho ManageEngine OpManager with Applications Manager Plugin through 12.4x. One can bypass the user password requirement and execute commands on the server. The "username+'@opm' string is used for the password. For example, if the username is admin, the password is admin@opm.

We recommend you to upgrade Applications Manager Plugin to version 14310 or above and OPM to the latest version to fix this issue.


Source and Acknowledgements

Find out more about CVE-2019-15106 from CVE Directory and NIST NVD.

Other Resources: https://www.pentest.com.tr/exploits/DEFCON-ManageEngine-OpManager-v12-4-Unauthenticated-Remote-Command-Execution.html

Need Help?

For clarification or corrections please contact our support team or email us at appmanager-support@manageengine.com

Loved by customers all over the world

"Standout Tool With Extensive Monitoring Capabilities"

It allows us to track crucial metrics such as response times, resource utilization, error rates, and transaction performance. The real-time monitoring alerts promptly notify us of any issues or anomalies, enabling us to take immediate action.

Reviewer Role: Research and Development

"I like Applications Manager because it helps us to detect issues present in our servers and SQL databases."
Carlos Rivero

Tech Support Manager, Lexmark

Trusted by over 6000+ businesses globally