ManageEngine ADSelfService Plus GINA Auth Bypass: Exec in SYSTEM
CVE-2023-35719 Published on September 6, 2023

ManageEngine ADSelfService Plus GINA Client Insufficient Verification of Data Authenticity Authentication Bypass Vulnerability
ManageEngine ADSelfService Plus GINA Client Insufficient Verification of Data Authenticity Authentication Bypass Vulnerability. This vulnerability allows physically present attackers to execute arbitrary code on affected installations of ManageEngine ADSelfService Plus. Authentication is not required to exploit this vulnerability. The specific flaw exists within the Password Reset Portal used by the GINA client. The issue results from the lack of proper authentication of data received via HTTP. An attacker can leverage this vulnerability to bypass authentication and execute code in the context of SYSTEM. Was ZDI-CAN-17009.

Vendor Advisory NVD

Weakness Type

Insufficient Verification of Data Authenticity

The software does not sufficiently verify the origin or authenticity of data, in a way that causes it to accept invalid data.


Products Associated with CVE-2023-35719

You can be notified by email with stack.watch whenever vulnerabilities like CVE-2023-35719 are published in Zoho Corp Manageengine Adselfservice Plus:

 

Affected Versions

ManageEngine ADSelfService Plus Version 6.1 Build 6122 is affected by CVE-2023-35719

Exploit Probability

EPSS
0.11%
Percentile
29.45%

EPSS (Exploit Prediction Scoring System) scores estimate the probability that a vulnerability will be exploited in the wild within the next 30 days. The percentile shows you how this score compares to all other vulnerabilities.