{"api_version":"1","generated_at":"2026-05-04T12:36:47+00:00","cve":"CVE-2018-11808","urls":{"html":"https://cve.report/CVE-2018-11808","api":"https://cve.report/api/cve/CVE-2018-11808.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2018-11808","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2018-11808"},"summary":{"title":"CVE-2018-11808","description":"Incorrect Access Control in CustomFieldsFeedServlet in Zoho ManageEngine Applications Manager Version 13 before build 13740 allows an attacker to delete any file and read certain files on the server in the context of the user (which by default is \"NT AUTHORITY / SYSTEM\") by sending a specially crafted request to the server.","state":"PUBLIC","assigner":"cve@mitre.org","published_at":"2018-06-06 03:29:00","updated_at":"2018-08-07 01:29:00"},"problem_types":["CWE-20"],"metrics":[],"references":[{"url":"https://www.manageengine.com/products/applications_manager/issues.html","name":"https://www.manageengine.com/products/applications_manager/issues.html","refsource":"MISC","tags":["Release Notes","Vendor Advisory"],"title":"","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://www.manageengine.com/products/applications_manager/security-updates/security-updates-cve-2018-11808.html","name":"https://www.manageengine.com/products/applications_manager/security-updates/security-updates-cve-2018-11808.html","refsource":"CONFIRM","tags":[],"title":"Security Updates - CVE Details | ManageEngine Applications Manager","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www.securityfocus.com/bid/104467","name":"104467","refsource":"BID","tags":["Third Party Advisory","VDB Entry"],"title":"Zoho ManageEngine Applications Manager CVE-2018-11808 Access Bypass Vulnerability","mime":"text/html","httpstatus":"200","archivestatus":"0"},{"url":"https://github.com/kactrosN/publicdisclosures","name":"https://github.com/kactrosN/publicdisclosures","refsource":"MISC","tags":["Third Party Advisory"],"title":"GitHub - kactrosN/publicdisclosures: publicdisclosures","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://www.cve.org/CVERecord?id=CVE-2018-11808","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2018-11808","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[{"cve_year":"2018","cve_id":"11808","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"zohocorp","cpe5":"manageengine_applications_manager","cpe6":"13","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2018","cve_id":"11808","vulnerable":"1","versionEndIncluding":"1","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"zohocorp","cpe5":"manageengine_applications_manager","cpe6":"13","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"}],"vendor_comments":[],"enrichments":{"kev":null,"epss":null,"legacy_qids":[]},"source_records":{"cve_program":{"CVE_data_meta":{"ASSIGNER":"cve@mitre.org","ID":"CVE-2018-11808","STATE":"PUBLIC"},"affects":{"vendor":{"vendor_data":[{"product":{"product_data":[{"product_name":"n/a","version":{"version_data":[{"version_value":"n/a"}]}}]},"vendor_name":"n/a"}]}},"data_format":"MITRE","data_type":"CVE","data_version":"4.0","description":{"description_data":[{"lang":"eng","value":"Incorrect Access Control in CustomFieldsFeedServlet in Zoho ManageEngine Applications Manager Version 13 before build 13740 allows an attacker to delete any file and read certain files on the server in the context of the user (which by default is \"NT AUTHORITY / SYSTEM\") by sending a specially crafted request to the server."}]},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"n/a"}]}]},"references":{"reference_data":[{"name":"https://www.manageengine.com/products/applications_manager/security-updates/security-updates-cve-2018-11808.html","refsource":"CONFIRM","url":"https://www.manageengine.com/products/applications_manager/security-updates/security-updates-cve-2018-11808.html"},{"name":"https://github.com/kactrosN/publicdisclosures","refsource":"MISC","url":"https://github.com/kactrosN/publicdisclosures"},{"name":"https://www.manageengine.com/products/applications_manager/issues.html","refsource":"MISC","url":"https://www.manageengine.com/products/applications_manager/issues.html"},{"name":"104467","refsource":"BID","url":"http://www.securityfocus.com/bid/104467"}]}},"nvd":{"publishedDate":"2018-06-06 03:29:00","lastModifiedDate":"2018-08-07 01:29:00","problem_types":["CWE-20"],"metrics":{"baseMetricV3":{"cvssV3":{"version":"3.0","vectorString":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"NONE","baseScore":9.1,"baseSeverity":"CRITICAL"},"exploitabilityScore":3.9,"impactScore":5.2},"baseMetricV2":{"cvssV2":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:C/I:C/A:C","accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE","baseScore":10},"severity":"HIGH","exploitabilityScore":10,"impactScore":10,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}},"configurations":{"CVE_data_version":"4.0","nodes":[{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:zohocorp:manageengine_applications_manager:13:*:*:*:*:*:*:*","cpe_name":[]}]}]}},"legacy_mitre":{"record":{"CveYear":"2018","CveId":"11808","Ordinal":"128319","Title":"CVE-2018-11808","CVE":"CVE-2018-11808","Year":"2018"},"notes":[{"CveYear":"2018","CveId":"11808","Ordinal":"1","NoteData":"Incorrect Access Control in CustomFieldsFeedServlet in Zoho ManageEngine Applications Manager Version 13 before build 13740 allows an attacker to delete any file and read certain files on the server in the context of the user (which by default is \"NT AUTHORITY / SYSTEM\") by sending a specially crafted request to the server.","Type":"Description","Title":null},{"CveYear":"2018","CveId":"11808","Ordinal":"2","NoteData":"2018-06-05","Type":"Other","Title":"Published"},{"CveYear":"2018","CveId":"11808","Ordinal":"3","NoteData":"2018-08-06","Type":"Other","Title":"Modified"}]}}}