{"api_version":"1","generated_at":"2026-04-23T23:08:50+00:00","cve":"CVE-2014-7863","urls":{"html":"https://cve.report/CVE-2014-7863","api":"https://cve.report/api/cve/CVE-2014-7863.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2014-7863","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2014-7863"},"summary":{"title":"CVE-2014-7863","description":"The FailOverHelperServlet (aka FailServlet) servlet in ZOHO ManageEngine Applications Manager before 11.9 build 11912, OpManager 8 through 11.5 build 11400, and IT360 10.5 and earlier does not properly restrict access, which allows remote attackers and remote authenticated users to (1) read arbitrary files via the fileName parameter in a copyfile operation or (2) obtain sensitive information via a directory listing in a listdirectory operation to servlet/FailOverHelperServlet.","state":"PUBLIC","assigner":"cve@mitre.org","published_at":"2020-02-08 17:15:00","updated_at":"2020-02-13 16:30:00"},"problem_types":["CWE-200"],"metrics":[],"references":[{"url":"https://support.zoho.com/portal/manageengine/helpcenter/articles/vulnerabilities-in-failoverhelperservlet","name":"https://support.zoho.com/portal/manageengine/helpcenter/articles/vulnerabilities-in-failoverhelperservlet","refsource":"MISC","tags":["Exploit","Vendor Advisory"],"title":"Vulnerabilities in FailOverHelperServlet","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://raw.githubusercontent.com/pedrib/PoC/master/ManageEngine/me_failservlet.txt","name":"https://raw.githubusercontent.com/pedrib/PoC/master/ManageEngine/me_failservlet.txt","refsource":"MISC","tags":["Broken Link"],"title":"","mime":"text/plain","httpstatus":"404","archivestatus":"404"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/100554","name":"https://exchange.xforce.ibmcloud.com/vulnerabilities/100554","refsource":"MISC","tags":["Third Party Advisory","VDB Entry"],"title":"IBM X-Force Exchange","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://packetstormsecurity.com/files/130162/ManageEngine-File-Download-Content-Disclosure-SQL-Injection.html","name":"http://packetstormsecurity.com/files/130162/ManageEngine-File-Download-Content-Disclosure-SQL-Injection.html","refsource":"MISC","tags":["Exploit","Third Party Advisory","VDB Entry"],"title":"ManageEngine File Download / Content Disclosure / SQL Injection ≈ Packet Storm","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://seclists.org/fulldisclosure/2015/Jan/114","name":"http://seclists.org/fulldisclosure/2015/Jan/114","refsource":"MISC","tags":["Exploit"],"title":"Full Disclosure: [The ManageOwnage Series, part XII]: Multiple vulnerabilities in FailOverServlet (OpManager, AppManager, IT360)","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www.securityfocus.com/archive/1/archive/1/534575/100/0/threaded","name":"http://www.securityfocus.com/archive/1/archive/1/534575/100/0/threaded","refsource":"MISC","tags":["Broken Link","Third Party Advisory","VDB Entry"],"title":"SecurityFocus","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://www.cve.org/CVERecord?id=CVE-2014-7863","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2014-7863","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[{"cve_year":"2014","cve_id":"7863","vulnerable":"1","versionEndIncluding":"11.9","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"zohocorp","cpe5":"manageengine_applications_manager","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2014","cve_id":"7863","vulnerable":"1","versionEndIncluding":"10.5","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"zohocorp","cpe5":"manageengine_it360","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2014","cve_id":"7863","vulnerable":"1","versionEndIncluding":"11.5","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"zohocorp","cpe5":"manageengine_opmanager","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"}],"vendor_comments":[],"enrichments":{"kev":null,"epss":null,"legacy_qids":[]},"source_records":{"cve_program":{"CVE_data_meta":{"ASSIGNER":"cve@mitre.org","ID":"CVE-2014-7863","STATE":"PUBLIC"},"data_format":"MITRE","data_type":"CVE","data_version":"4.0","description":{"description_data":[{"lang":"eng","value":"The FailOverHelperServlet (aka FailServlet) servlet in ZOHO ManageEngine Applications Manager before 11.9 build 11912, OpManager 8 through 11.5 build 11400, and IT360 10.5 and earlier does not properly restrict access, which allows remote attackers and remote authenticated users to (1) read arbitrary files via the fileName parameter in a copyfile operation or (2) obtain sensitive information via a directory listing in a listdirectory operation to servlet/FailOverHelperServlet."}]},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"n/a"}]}]},"affects":{"vendor":{"vendor_data":[{"product":{"product_data":[{"product_name":"n/a","version":{"version_data":[{"version_value":"n/a"}]}}]},"vendor_name":"n/a"}]}},"references":{"reference_data":[{"refsource":"MISC","name":"http://packetstormsecurity.com/files/130162/ManageEngine-File-Download-Content-Disclosure-SQL-Injection.html","url":"http://packetstormsecurity.com/files/130162/ManageEngine-File-Download-Content-Disclosure-SQL-Injection.html"},{"refsource":"MISC","name":"https://raw.githubusercontent.com/pedrib/PoC/master/ManageEngine/me_failservlet.txt","url":"https://raw.githubusercontent.com/pedrib/PoC/master/ManageEngine/me_failservlet.txt"},{"refsource":"MISC","name":"http://www.securityfocus.com/archive/1/archive/1/534575/100/0/threaded","url":"http://www.securityfocus.com/archive/1/archive/1/534575/100/0/threaded"},{"refsource":"MISC","name":"http://seclists.org/fulldisclosure/2015/Jan/114","url":"http://seclists.org/fulldisclosure/2015/Jan/114"},{"refsource":"MISC","name":"https://support.zoho.com/portal/manageengine/helpcenter/articles/vulnerabilities-in-failoverhelperservlet","url":"https://support.zoho.com/portal/manageengine/helpcenter/articles/vulnerabilities-in-failoverhelperservlet"},{"refsource":"MISC","name":"https://exchange.xforce.ibmcloud.com/vulnerabilities/100554","url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/100554"}]}},"nvd":{"publishedDate":"2020-02-08 17:15:00","lastModifiedDate":"2020-02-13 16:30:00","problem_types":["CWE-200"],"metrics":{"baseMetricV3":{"cvssV3":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"NONE","availabilityImpact":"NONE","baseScore":7.5,"baseSeverity":"HIGH"},"exploitabilityScore":3.9,"impactScore":3.6},"baseMetricV2":{"cvssV2":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:N/A:N","accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"NONE","availabilityImpact":"NONE","baseScore":5},"severity":"MEDIUM","exploitabilityScore":10,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}},"configurations":{"CVE_data_version":"4.0","nodes":[{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:zohocorp:manageengine_it360:*:*:*:*:*:*:*:*","versionEndIncluding":"10.5","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:zohocorp:manageengine_opmanager:*:*:*:*:*:*:*:*","versionStartIncluding":"8","versionEndIncluding":"11.5","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:zohocorp:manageengine_applications_manager:*:*:*:*:*:*:*:*","versionEndIncluding":"11.9","cpe_name":[]}]}]}},"legacy_mitre":{"record":{"CveYear":"2014","CveId":"7863","Ordinal":"74883","Title":"CVE-2014-7863","CVE":"CVE-2014-7863","Year":"2014"},"notes":[{"CveYear":"2014","CveId":"7863","Ordinal":"1","NoteData":"The FailOverHelperServlet (aka FailServlet) servlet in ZOHO ManageEngine Applications Manager before 11.9 build 11912, OpManager 8 through 11.5 build 11400, and IT360 10.5 and earlier does not properly restrict access, which allows remote attackers and remote authenticated users to (1) read arbitrary files via the fileName parameter in a copyfile operation or (2) obtain sensitive information via a directory listing in a listdirectory operation to servlet/FailOverHelperServlet.","Type":"Description","Title":null},{"CveYear":"2014","CveId":"7863","Ordinal":"2","NoteData":"2020-02-08","Type":"Other","Title":"Published"},{"CveYear":"2014","CveId":"7863","Ordinal":"3","NoteData":"2020-02-08","Type":"Other","Title":"Modified"}]}}}