Learn about CVE-2020-35765, a SQL Injection vulnerability in Zoho ManageEngine Applications Manager allowing authenticated attackers to execute malicious SQL queries. Find mitigation steps and security practices here.
Zoho ManageEngine Applications Manager through 14930 is vulnerable to an authenticated SQL Injection via the resourceid parameter to showresource.do.
Understanding CVE-2020-35765
This CVE involves a security vulnerability in Zoho ManageEngine Applications Manager that allows for SQL Injection.
What is CVE-2020-35765?
The vulnerability lies in the doFilter function in com.adventnet.appmanager.filter.UriCollector in Zoho ManageEngine Applications Manager through version 14930, enabling an authenticated SQL Injection attack through the resourceid parameter to showresource.do.
The Impact of CVE-2020-35765
The vulnerability could be exploited by authenticated attackers to execute malicious SQL queries, potentially leading to data theft, manipulation, or unauthorized access within the affected system.
Technical Details of CVE-2020-35765
This section provides more in-depth technical insights into the CVE.
Vulnerability Description
The vulnerability allows authenticated users to perform SQL Injection attacks via the resourceid parameter in the showresource.do function.
Affected Systems and Versions
Exploitation Mechanism
The vulnerability can be exploited by authenticated users manipulating the resourceid parameter to inject malicious SQL queries.
Mitigation and Prevention
Protecting systems from CVE-2020-35765 requires immediate actions and long-term security measures.
Immediate Steps to Take
Long-Term Security Practices
Patching and Updates
Zoho ManageEngine has released security updates to address CVE-2020-35765. It is crucial to apply these patches promptly to mitigate the risk of exploitation.