Vulnerabilites related to ManageEngine - Analytics Plus
CVE-2024-9100 (GCVE-0-2024-9100)
Vulnerability from cvelistv5
Published
2024-10-03 14:17
Modified
2024-10-03 15:33
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-22 - Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
Summary
Zohocorp ManageEngine Analytics Plus versions before 5410 and Zoho Analytics On-Premise versions before 5410 are vulnerable to Path traversal.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
ManageEngine | Analytics Plus |
Version: 0 |
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-9100", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-10-03T15:33:46.340790Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-10-03T15:33:56.745Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "collectionURL": "https://www.manageengine.com/analytics-plus/", "defaultStatus": "unaffected", "product": "Analytics Plus", "vendor": "ManageEngine", "versions": [ { "lessThan": "5410", "status": "affected", "version": "0", "versionType": "5410" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Zohocorp ManageEngine Analytics Plus versions before 5410 and\u0026nbsp;Zoho Analytics On-Premise\u0026nbsp;versions before 5410 are vulnerable to Path traversal." } ], "value": "Zohocorp ManageEngine Analytics Plus versions before 5410 and\u00a0Zoho Analytics On-Premise\u00a0versions before 5410 are vulnerable to Path traversal." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-22", "description": "CWE-22 Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-10-03T14:17:02.797Z", "orgId": "0fc0942c-577d-436f-ae8e-945763c79b02", "shortName": "ManageEngine" }, "references": [ { "url": "https://www.manageengine.com/analytics-plus/CVE-2024-9100.html" }, { "url": "https://www.zoho.com/analytics/onpremise/CVE-2024-9100.html" } ], "source": { "discovery": "UNKNOWN" }, "title": "Local File Inclusion", "x_generator": { "engine": "Vulnogram 0.2.0" } } }, "cveMetadata": { "assignerOrgId": "0fc0942c-577d-436f-ae8e-945763c79b02", "assignerShortName": "ManageEngine", "cveId": "CVE-2024-9100", "datePublished": "2024-10-03T14:17:02.797Z", "dateReserved": "2024-09-23T11:38:13.736Z", "dateUpdated": "2024-10-03T15:33:56.745Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2024-52323 (GCVE-0-2024-52323)
Vulnerability from cvelistv5
Published
2024-11-27 09:54
Modified
2024-11-27 14:28
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-200 - Exposure of Sensitive Information to an Unauthorized Actor
Summary
Zohocorp ManageEngine Analytics Plus versions below 6100 are vulnerable to authenticated sensitive data exposure which allows the users to retrieve sensitive tokens associated to the org-admin account.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
ManageEngine | Analytics Plus |
Version: 0 |
{ "containers": { "adp": [ { "affected": [ { "cpes": [ "cpe:2.3:a:manageengine:analytic_plus:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "analytic_plus", "vendor": "manageengine", "versions": [ { "lessThan": "6100", "status": "affected", "version": "0", "versionType": "custom" } ] } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" } }, { "other": { "content": { "id": "CVE-2024-52323", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-11-27T14:17:55.542421Z", "version": "2.0.3" }, "type": "ssvc" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-276", "description": "CWE-276 Incorrect Default Permissions", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-11-27T14:28:29.127Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "collectionURL": "https://www.manageengine.com/analytics-plus/", "defaultStatus": "unaffected", "product": "Analytics Plus", "vendor": "ManageEngine", "versions": [ { "lessThan": "6100", "status": "affected", "version": "0", "versionType": "6100" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Zohocorp\u0026nbsp;ManageEngine Analytics Plus versions below 6100 are vulnerable to authenticated sensitive data exposure which allows the users to retrieve sensitive tokens associated to the org-admin account." } ], "value": "Zohocorp\u00a0ManageEngine Analytics Plus versions below 6100 are vulnerable to authenticated sensitive data exposure which allows the users to retrieve sensitive tokens associated to the org-admin account." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-200", "description": "CWE-200 Exposure of Sensitive Information to an Unauthorized Actor", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-11-27T09:54:07.999Z", "orgId": "0fc0942c-577d-436f-ae8e-945763c79b02", "shortName": "ManageEngine" }, "references": [ { "url": "https://www.manageengine.com/analytics-plus/CVE-2024-52323.html" } ], "source": { "discovery": "UNKNOWN" }, "title": "Sensitive Data Exposure", "x_generator": { "engine": "Vulnogram 0.2.0" } } }, "cveMetadata": { "assignerOrgId": "0fc0942c-577d-436f-ae8e-945763c79b02", "assignerShortName": "ManageEngine", "cveId": "CVE-2024-52323", "datePublished": "2024-11-27T09:54:07.999Z", "dateReserved": "2024-11-07T11:25:31.904Z", "dateUpdated": "2024-11-27T14:28:29.127Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }