Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2021-31159 PoC — Zoho ManageEngine ServiceDesk Plus MSP 安全漏洞

Source
Associated Vulnerability
Title:Zoho ManageEngine ServiceDesk Plus MSP 安全漏洞 (CVE-2021-31159)
Description:Zoho ManageEngine ServiceDesk Plus MSP before 10519 is vulnerable to a User Enumeration bug due to improper error-message generation in the Forgot Password functionality, aka SDPMSP-15732.
Description
Zoho ManageEngine ServiceDesk Plus MSP - Active Directory User Enumeration (CVE-2021-31159) - https://ricardojoserf.github.io/CVE-2021-31159/
Readme
# Zoho ManageEngine ServiceDesk Plus MSP - Active Directory User Enumeration (CVE-2021-31159)

This script takes advantage of ServiceDesk Plus before build 10519 having different output in the password recovery functionality: if the user exists it returns a message claiming an email has been sent but if it does not exist the message is always the same. 

Knowing this it is possible to enumerate accounts in the application or, what we will try to exploit with this script, accounts of an Active Directory if AD authentication is enabled. Very useful when the application is open to the internet and the format of the AD user accounts (for example, name initial + surname) is known.

```
python3 exploit.py -t TARGET_URL -d DOMAIN -u USERSFILE [-o OUTPUTFILE]
```  
File Snapshot

[4.0K] /data/pocs/f3fb4d7166c52029c3f7dbb2574084e4374c28f7 ├── [2.2K] exploit.py └── [ 768] README.md 0 directories, 2 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. Local POC snapshots are reserved for subscribers — if the original source is unavailable, the local mirror is part of the paid plan.
    3. Mirroring, verifying, and maintaining this POC archive takes ongoing effort, so local snapshots are a paid feature. Your subscription keeps the archive online — thank you for the support. View subscription plans →