|Affected software versions||Builds 6120 and below|
|Fixed version||Build 6121|
|Fixed on||March 3, 2022|
CVE-2022-24681 refers to a security vulnerability found in ManageEngine ADSelfService Plus that allowed XSS script execution on the reset password, unlock account, and user must change password pages. The vulnerability was triggered by a script inserted by the user while editing their profile information in the attribute field for the welcome name. This issue has now been fixed by blocking script execution on the above pages.
This vulnerability affects only the respective user or anyone attempting to impersonate that user.
Update your ADSelfService Plus instance to 6121 using the service pack.
Currently, there are no work-arounds for this vulnerability. We recommend you update ADSelfService Plus to the latest build.
We are not aware of any public exploits or malicious use of the vulnerability described in this advisory.
This issue was reported by Matt.
Need further assistance? Fill this form, and we'll contact you rightaway.
Free Active Directory users from attending lengthy help desk calls by allowing them to self-service their password resets/ account unlock tasks. Hassle-free password change for Active Directory users with ADSelfService Plus ‘Change Password’ console.
Get seamless one-click access to 100+ cloud applications. With enterprise single sign-on, users can access all their cloud applications with their Active Directory credentials. Thanks to ADSelfService Plus!
Intimate Active Directory users of their impending password/account expiry by mailing them these password/account expiry notifications.
Synchronize Windows Active Directory user password/account changes across multiple systems, automatically, including Office 365, G Suite, IBM iSeries and more.
Ensure strong user passwords that resist various hacking threats with ADSelfService Plus by enforcing Active Directory users to adhere to compliant passwords via displaying password complexity requirements.