{"uuid": "11e53411-1e59-48ce-8836-9347444ddf67", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2021-40539", "type": "published-proof-of-concept", "source": "https://t.me/ptswarm/88", "content": "How to exploit CVE-2021-40539 on ManageEngine ADSelfService Plus\n\n\ud83d\udc64 by Antoine Cervoise, Wilfried B\u00e9card\n\nADSS offers multiple functionalities such as managing password policies for administrators or self password reset/account unlock for Active Directory users.\nIn this article research team explore the details of several vulnerabilities that allow an unauthenticated attacker to execute arbitrary code on the server.\n\n\ud83d\udcdd Contents: \n\u2022 First steps\n\u2022 Authentication Bypass\n\u2022 Arbitrary file upload through the API\n\u2022 Arguments injection\n\u2022 Chaining everything together to get code execution\n\u2022 Conclusion\n\nhttps://www.synacktiv.com/publications/how-to-exploit-cve-2021-40539-on-manageengine-adselfservice-plus.html", "creation_timestamp": "2021-11-05T13:29:35.000000Z"}