CVE-2020-11531
Summary
| CVE | CVE-2020-11531 |
| State | PUBLIC |
| Assigner | [email protected] |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2020-05-08 21:15:00 UTC |
| Updated | 2020-05-18 12:15:00 UTC |
| Description | The DataEngine Xnode Server application in Zoho ManageEngine DataSecurity Plus prior to 6.0.1 does not validate the database schema name when handling a DR-SCHEMA-SYNC request. This allows an authenticated attacker to execute code in the context of the product by writing a JSP file to the webroot directory via directory traversal. |
NVD Known Affected Configurations (CPE 2.3)
References
| Reference | Source | Link | Tags |
|---|
| POPUP |
CONFIRM |
pitstop.manageengine.com |
|
| Full Disclosure: DataSecurity Plus Xnode Server - Remote Code Execution via Path Traversal |
MISC |
seclists.org |
Exploit, Mailing List, Third Party Advisory |
| ManageEngine DataSecurity Plus Path Traversal / Code Execution ≈ Packet Storm |
MISC |
packetstormsecurity.com |
Exploit, Third Party Advisory, VDB Entry |
| CVE Program record |
CVE.ORG |
www.cve.org |
canonical |
| NVD vulnerability detail |
NVD |
nvd.nist.gov |
canonical, analysis |
No vendor comments have been submitted for this CVE.
Legacy QID Mappings
- 375418 Zoho ManageEngine DataSecurity Plus Remote Code Execution Vulnerability