Zoho ManageEngine ADSelfService Plus version 6113 and prior is vulnerable to REST API authentication bypass with resultant remote code execution.
References
| Link | Resource |
|---|---|
| http://packetstormsecurity.com/files/165085/ManageEngine-ADSelfService-Plus-Authentication-Bypass-Code-Execution.html | Exploit Third Party Advisory VDB Entry |
| https://www.manageengine.com | Product |
| https://www.manageengine.com/products/self-service-password/kb/how-to-fix-authentication-bypass-vulnerability-in-REST-API.html | Patch Vendor Advisory |
| http://packetstormsecurity.com/files/165085/ManageEngine-ADSelfService-Plus-Authentication-Bypass-Code-Execution.html | Exploit Third Party Advisory VDB Entry |
| https://www.manageengine.com | Product |
| https://www.manageengine.com/products/self-service-password/kb/how-to-fix-authentication-bypass-vulnerability-in-REST-API.html | Patch Vendor Advisory |
| https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2021-40539 | US Government Resource |
Configurations
Configuration 1 (hide)
|
History
No history.
Information
Published : 2021-09-07 17:15
Updated : 2025-11-05 19:13
NVD link : CVE-2021-40539
Mitre link : CVE-2021-40539
CVE.ORG link : CVE-2021-40539
JSON object : View
Products Affected
zohocorp
- manageengine_adselfservice_plus
CWE
CWE-706
Use of Incorrectly-Resolved Name or Reference
