ManageEngine AppManager15 (Build No:15510) - DLL Hijacking

9.1

Critical

Discovered by 

Lautaro Casanova

Offensive Team, Fluid Attacks

Summary

Full name

ManageEngine AppManager15 (Build No:15510) - DLL Hijacking

Code name

State

Public

Release date

Feb 9, 2022

Affected product

ManageEngine

Affected version(s)

AppManager15 (Build No:15510)

Fixed version(s)

AppManager15 (Build No:15520)

Vulnerability name

DLL Hijacking

Remotely exploitable

Yes

CVSS v3.1 vector string

CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H

CVSS v3.1 base score

9.1

Exploit available

No

Description

ManageEngine AppManager15 (Build No:15510) allows an authenticated admin user to upload a DLL file to perform a DLL hijack attack inside the working folder through the Upload Files / Binaries functionality.

Proof of Concept

Steps to reproduce

  1. Log in as an admin user.

  2. Go to Settings.

  3. Go to the Tools section and click on Upload Files / Binaries.

  4. Select the Upload Script to <Product_Home>/working/ option.

  5. Create a malicious DLL with one of the following names

    
    
  6. Upload the file.

  7. Go to Shutdown / Restart Service and click on Restart

  8. Wait for the service to restart in order to load the DLL file.

System Information

  • Version: ManageEngine AppManager15 (Build No:15510).

  • Operating System: Windows 10.0.19042 N/A Build 19042.

Exploit

There is no exploit for the vulnerability but can be manually exploited.

Mitigation

An updated version of ManageEngine is available at the vendor page.

References

Timeline

Vulnerability discovered

Feb 3, 2022

Vendor Confirmed Vuln.

Feb 8, 2022

Vulnerability patched

Feb 19, 2022

Vendor contacted

Feb 3, 2022

Vendor replied

Feb 4, 2022

Public disclosure

May 20, 2022

Start your 21-day free trial

Discover the benefits of our Continuous Hacking solution, which organizations of all sizes are already enjoying.

Start your 21-day free trial

Discover the benefits of our Continuous Hacking solution, which organizations of all sizes are already enjoying.

Start your 21-day free trial

Discover the benefits of our Continuous Hacking solution, which organizations of all sizes are already enjoying.

Fluid Attacks' solutions enable organizations to identify, prioritize, and remediate vulnerabilities in their software throughout the SDLC. Supported by AI, automated tools, and pentesters, Fluid Attacks accelerates companies' risk exposure mitigation and strengthens their cybersecurity posture.

SOC 2 Type II

SOC 3

Subscribe to our newsletter

Stay updated on our upcoming events and latest blog posts, advisories and other engaging resources.

© 2025 Fluid Attacks. We hack your software.

Fluid Attacks' solutions enable organizations to identify, prioritize, and remediate vulnerabilities in their software throughout the SDLC. Supported by AI, automated tools, and pentesters, Fluid Attacks accelerates companies' risk exposure mitigation and strengthens their cybersecurity posture.

SOC 2 Type II

SOC 3

Subscribe to our newsletter

Stay updated on our upcoming events and latest blog posts, advisories and other engaging resources.

© 2025 Fluid Attacks. We hack your software.

Fluid Attacks' solutions enable organizations to identify, prioritize, and remediate vulnerabilities in their software throughout the SDLC. Supported by AI, automated tools, and pentesters, Fluid Attacks accelerates companies' risk exposure mitigation and strengthens their cybersecurity posture.

SOC 2 Type II

SOC 3

Subscribe to our newsletter

Stay updated on our upcoming events and latest blog posts, advisories and other engaging resources.

© 2025 Fluid Attacks. We hack your software.