Synopsis
During the course of Nessus plugin development, Tenable discovered several issues in ADAudit Plus:
- A Cross-site Request Forgery (CSRF) vulnerability that allows for the creation of an arbitrary administrative account, if a currently authenticated administrator is tricked into clicking a link. The issue is due to the /TechnicianConfiguration.do script not requiring multiple steps, explicit confirmation, or a unique token when performing actions related to the script. This can be used to create an arbitrary account with administrative privileges.
- Multiple stored cross-site scripting (XSS) issues. Note that these are likely considered lower risk, as they require administrative authentication. However, not all administrators of an application are presumed to have the permissions and information that can be gained from such an attack.
- SaveMonitor.do MONITOR_NAME parameter
- UpdateMonitor.do MONITOR_NAME parameter
- SaveAlertProfile.do ALERT_PROFILE_NAME parameter
- UpdateAlertProfile.do ALERT_PROFILE_NAME parameter
- CreateCustomReport.do customReportName parameter
- SaveAuditAction.do ACTION_NAME and ACTION_DESCRIPTION parameters
- CreateScheduler.do scheduleName parameter
- A remote privilege escalation vulnerability that can be performed with the absolute least privileged account (e.g. 'Nothing' permissions with only read access), to gain full administrative access to the application. The issue is due to the /TechnicianConfiguration.do script not properly checking for user privileges, allowing any user to create a new administrative account.
- The web interface installs with default administrative credentials (admin/admin).
Solution
Zoho has released ADAudit Plus 5.0 Build 5020 to address these vulnerabilities.
Additional References
https://www.manageengine.com/products/active-directory-audit/service-pack.htmlhttps://www.manageengine.com/products/active-directory-audit/download.html
https://www.manageengine.com/products/active-directory-audit/adaudit-plus-release-notes.html
Disclosure Timeline
All information within TRA advisories is provided “as is”, without warranty of any kind, including the implied warranties of merchantability and fitness for a particular purpose, and with no guarantee of completeness, accuracy, or timeliness. Individuals and organizations are responsible for assessing the impact of any actual or potential security vulnerability.
Tenable takes product security very seriously. If you believe you have found a vulnerability in one of our products, we ask that you please work with us to quickly resolve it in order to protect customers. Tenable believes in responding quickly to such reports, maintaining communication with researchers, and providing a solution in short order.
For more details on submitting vulnerability information, please see our Vulnerability Reporting Guidelines page.
If you have questions or corrections about this advisory, please email [email protected]