Security Advisory

March 22, 2022

A stored XSS vulnerability in the request history that allowed users to inject malicious code into the application has been fixed in 11020. Please visit this link for more information.

December 04, 2021

This security advisory addresses an authentication bypass vulnerability that affects SupportCenter Plus versions up to 11017.

Please note that we are noticing exploits of this vulnerability, and we strongly urge all customers using SupportCenter Plus (all editions) with versions up to 11017 to update to the latest version immediately.

Severity: High

Impact:

This vulnerability allows an adversary to gain unauthorized access to the application's data through a few application URLs. To do so, an attacker has to manipulate any vulnerable application URL path from the module with a proper character set replacement.

What led to the vulnerability?

One of the application filters used for handling state in the list view was not configured properly, and a crafted URL using this filter would enable an authenticated servlet to be accessed without proper authentication. APIs and other URL calls are not affected.

Who is affected?

This vulnerability affects SupportCenter Plus customers of all editions using versions up to 11017.

How have we fixed it?

We have added additional checks to ensure the filters are properly configured to avoid the authentication bypass vulnerability.

How to find out if you are affected

Click the Help link in the top-right corner of the SupportCenter Plus web client, and select About from the drop-down to see your current version. If your current version is 11017, you might be affected.

Please follow this forum post for any further updates regarding this vulnerability.

What customers should do

Customers who fit the above criteria can upgrade to the latest version (11018) using the appropriate migration path.

Please read the upgrade instructions carefully before beginning the upgrade. For assistance, write to support@supportcenterplus.com or call us toll-free at +1.888.720.9500.

Important note: As always, make a copy of the entire SupportCenter Plus installation folder before applying the upgrade, and keep the copy in a separate location. If anything goes wrong during the upgrade, you'll have this copy as a backup, which will keep all your settings intact. If you're using an MS SQL server as a back-end database, back up the SupportCenter Plus database before upgrading. Once the upgrade is successfully completed, remember to delete the backup.

We offer our sincerest apologies for any inconvenience this may have caused. If you have any questions or concerns, please reach out to us at support@supportcenterplus.com.

Best regards,
Umashankar
ManageEngine SupportCenter Plus

November 23, 2021

This security advisory addresses an unauthenticated remote code execution (RCE) vulnerability affecting SupportCenter Plus versions 11012 and 11013.

This vulnerability was addressed on September 16, 2021 in versions 11014 and above, and an advisory was published as well.

Please note that we are noticing exploits of this vulnerability, and we strongly urge all customers using SupportCenter Plus (all editions) with versions 11012 and 11013 to update to the latest version immediately.

Severity: Critical

Impact:

This vulnerability can allow an adversary to execute arbitrary code and carry out any subsequent attacks.

What led to the vulnerability?

A security misconfiguration in SupportCenter Plus led to the vulnerability.

Who is affected?

This vulnerability affects SupportCenter Plus customers of all editions using versions 11012 and 11013.

How have we fixed it?

The vulnerability has been addressed by properly configuring the security configuration and removing the unused URL in versions 11014 and above.

How to find out if you are affected

Click the Help link in the top-right corner of the SupportCenter Plus web client, and select About from the drop-down to see your current version. If your current version is 11012 or 11013, you might be affected.

Please follow this forum post for any further updates regarding this vulnerability.

What customers should do

Customers who fit the above criteria can upgrade to the latest version (11016) using the appropriate migration path.

Please read the upgrade instructions carefully before beginning the upgrade. For assistance, write to support@supportcenterplus.com or call us toll-free at +1.888.720.9500.

Important note: As always, make a copy of the entire SupportCenter Plus installation folder before applying the upgrade, and keep the copy in a separate location. If anything goes wrong during the upgrade, you'll have this copy as a backup, which will keep all your settings intact. If you're using an MS SQL server as a back-end database, back up the SupportCenter Plus database before upgrading. Once the upgrade is successfully completed, remember to delete the backup.

We offer our sincerest apologies for any inconvenience this may have caused. If you have any questions or concerns, please reach out to us at support@supportcenterplus.com.

Best regards,
Umashankar
ManageEngine SupportCenter Plus

September 16, 2021

This is a security advisory regarding a possible authentication bypass vulnerability in a few application URLs in SupportCenter Plus, which has been identified and rectified. Users of SupportCenter Plus (all editions) with version 11012 and above might be affected by this vulnerability and are advised update to the latest version (11014) immediately.

Severity: High

Impact:

This vulnerability allows an attacker to gain unauthorized access to the application's data through a few of its application URLs. To do so, an attacker has to manipulate any vulnerable application URL path with a proper character set replacement.

This URL can bypass the authentication process and fetch the required data for the attacker, allowing the attacker to gain unauthorized access to user data or carry out subsequent attacks.

What led to the vulnerability?

The improper security configuration process used in SupportCenter Plus led to the vulnerability.

Who is affected?

This vulnerability affects SupportCenter Plus customers of all editions using versions 11012 and above.

How have we fixed it?

The vulnerability has been addressed by fixing the security configuration process in the latest version of SupportCenter Plus.

How to find out if you are affected

Click the Help link in the top-right corner of the SupportCenter Plus web client, and select About from the drop-down to see your current version. If your current version is 11012 or above, you might be affected.

What customers should do

Customers who fit the above criteria can upgrade to the latest version (11014) using the appropriate migration path.

Please read the upgrade instructions carefully before beginning the upgrade. For assistance, write to support@supportcenterplus.com or call us toll-free at +1.888.720.9500.

Important note:

As always, make a copy of the entire SupportCenter Plus installation folder before applying the upgrade, and keep the copy in a separate location. If anything goes wrong during the upgrade, you'll have this copy as a backup, which will keep all your settings intact. If you're using an MS SQL server as a back-end database, back up the SupportCenter Plus database before upgrading. Once the upgrade is successfully completed, remember to delete the backup.

We offer our sincerest apologies for any inconvenience this may have caused. If you have any questions or concerns, please reach out to us at support@supportcenterplus.com.

Best regards,
Umashankar
ManageEngine SupportCenter Plus

July 22, 2021

This is a security advisory regarding a possible authentication bypass vulnerability in a few REST API URLs in SupportCenter Plus, which has been identified and rectified. Users of SupportCenter Plus (all editions) with version 11000 and above might be affected by this vulnerability and are advised to update to the latest version (11013) immediately.

Severity: Critical

Impact:

This vulnerability allows an attacker to gain unauthorized access to the application's data through its API support. This would allow the attacker to gain unauthorized access to user data or aid subsequent attacks.

To do so, an attacker has to manipulate any vulnerable API URL path from the requests module with a proper character set replacement. This URL can bypass the authentication process and fetch the required data for the attacker.

What led to the vulnerability?

The security framework layer used in SupportCenter Plus had an improper URL validation process that led to the vulnerability.

Who is affected?

This vulnerability affects SupportCenter Plus customers of all editions using versions 11000 and above.

How have we fixed it?

The vulnerability has been addressed in SupportCenter Plus 11013 by fixing the improper URL validation process in the security framework layer.

How to find out if you are affected

Click the Help link in the top-right corner of the SupportCenter Plus web client. Select the About option from the drop-down to see your current version. If your current version is 11000 or above, you might be affected.

What customers should do

Customers who fit the above criteria can upgrade to the latest version (11013) using the appropriate migration path here.

Please read the upgrade instructions carefully before beginning the upgrade. For assistance, write to support@supportcenterplus.com or call us toll-free at +1.888.720.9500.

Important note:

As always, make a copy of the entire SupportCenter Plus installation folder before applying the upgrade, and keep the copy in a separate location. If anything goes wrong during the upgrade, you'll have this copy as a backup, which will keep all your settings intact. If you're using an MS SQL server as a back-end database, back up the SupportCenter Plus database before upgrading. Once the upgrade is successfully completed, remember to delete the backup.

We offer our sincerest apologies for any inconvenience this may have caused. If you have any questions or concerns, please reach out to us at support@supportcenterplus.com.

Best regards,
Umashankar
ManageEngine SupportCenter Plus

World's Largest Organizations Rely On SupportCenter Plus