CVE-2023-47211: CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in ManageEngine OpManager
A directory traversal vulnerability exists in the uploadMib functionality of ManageEngine OpManager 12.7.258. A specially crafted HTTP request can lead to arbitrary file creation. An attacker can send a malicious MiB file to trigger this vulnerability.
AI Analysis
Technical Summary
CVE-2023-47211 is a directory traversal vulnerability classified under CWE-22 found in ManageEngine OpManager version 12.7.258. The flaw exists in the uploadMib functionality, which processes MiB files uploaded via HTTP requests. Due to improper validation and limitation of pathname inputs, an attacker can craft a malicious MiB file that includes directory traversal sequences (e.g., ../) to escape the intended upload directory. This allows arbitrary file creation anywhere on the filesystem where the OpManager process has write permissions. The vulnerability requires the attacker to have low-level privileges (PR:L) but does not require user interaction (UI:N) and can be exploited remotely over the network (AV:N). The scope is changed (S:C) because the vulnerability can affect resources beyond the initially vulnerable component. The impact on confidentiality is high (C:H) as sensitive files could be overwritten or created, potentially leading to information disclosure or privilege escalation. Integrity impact is low (I:L) but still present due to unauthorized file creation, and availability impact is low (A:L) but could be leveraged to disrupt services. No patches or exploits are currently publicly available, but the critical severity and ease of exploitation make this a significant threat to organizations using this version of OpManager.
Potential Impact
For European organizations, the impact of CVE-2023-47211 can be substantial, especially for enterprises relying on ManageEngine OpManager for network monitoring and management. Successful exploitation could allow attackers to create or overwrite files, potentially leading to unauthorized access to sensitive configuration files, credentials, or system binaries. This could facilitate further lateral movement, privilege escalation, or persistent backdoors within the network. Confidentiality breaches could expose sensitive corporate or customer data, while integrity compromises might disrupt network monitoring accuracy or availability. Given the critical CVSS score and the network-exploitable nature of the vulnerability, organizations face a high risk of targeted attacks or automated exploitation once public exploits emerge. The lack of user interaction requirement further increases the threat level, as attackers can operate stealthily and remotely. The potential disruption to network management services could also impact operational continuity and incident response capabilities.
Mitigation Recommendations
European organizations should immediately assess their exposure to ManageEngine OpManager version 12.7.258 and prioritize remediation. Since no official patch is currently listed, organizations should implement the following mitigations: 1) Restrict access to the OpManager web interface and uploadMib functionality to trusted IP ranges and authenticated users only. 2) Employ web application firewalls (WAFs) with custom rules to detect and block directory traversal payloads targeting the uploadMib endpoint. 3) Monitor logs for suspicious upload attempts containing directory traversal patterns or unusual file creation activities. 4) Run OpManager with the least privileges necessary, limiting filesystem write permissions to only required directories to contain potential damage. 5) Consider temporary disabling or restricting the uploadMib feature if not essential. 6) Stay alert for official patches or updates from ManageEngine and apply them promptly once available. 7) Conduct internal vulnerability scans and penetration tests focused on this vulnerability to verify mitigation effectiveness.
Affected Countries
Germany, United Kingdom, France, Netherlands, Italy, Spain, Sweden
CVE-2023-47211: CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in ManageEngine OpManager
Description
A directory traversal vulnerability exists in the uploadMib functionality of ManageEngine OpManager 12.7.258. A specially crafted HTTP request can lead to arbitrary file creation. An attacker can send a malicious MiB file to trigger this vulnerability.
AI-Powered Analysis
Technical Analysis
CVE-2023-47211 is a directory traversal vulnerability classified under CWE-22 found in ManageEngine OpManager version 12.7.258. The flaw exists in the uploadMib functionality, which processes MiB files uploaded via HTTP requests. Due to improper validation and limitation of pathname inputs, an attacker can craft a malicious MiB file that includes directory traversal sequences (e.g., ../) to escape the intended upload directory. This allows arbitrary file creation anywhere on the filesystem where the OpManager process has write permissions. The vulnerability requires the attacker to have low-level privileges (PR:L) but does not require user interaction (UI:N) and can be exploited remotely over the network (AV:N). The scope is changed (S:C) because the vulnerability can affect resources beyond the initially vulnerable component. The impact on confidentiality is high (C:H) as sensitive files could be overwritten or created, potentially leading to information disclosure or privilege escalation. Integrity impact is low (I:L) but still present due to unauthorized file creation, and availability impact is low (A:L) but could be leveraged to disrupt services. No patches or exploits are currently publicly available, but the critical severity and ease of exploitation make this a significant threat to organizations using this version of OpManager.
Potential Impact
For European organizations, the impact of CVE-2023-47211 can be substantial, especially for enterprises relying on ManageEngine OpManager for network monitoring and management. Successful exploitation could allow attackers to create or overwrite files, potentially leading to unauthorized access to sensitive configuration files, credentials, or system binaries. This could facilitate further lateral movement, privilege escalation, or persistent backdoors within the network. Confidentiality breaches could expose sensitive corporate or customer data, while integrity compromises might disrupt network monitoring accuracy or availability. Given the critical CVSS score and the network-exploitable nature of the vulnerability, organizations face a high risk of targeted attacks or automated exploitation once public exploits emerge. The lack of user interaction requirement further increases the threat level, as attackers can operate stealthily and remotely. The potential disruption to network management services could also impact operational continuity and incident response capabilities.
Mitigation Recommendations
European organizations should immediately assess their exposure to ManageEngine OpManager version 12.7.258 and prioritize remediation. Since no official patch is currently listed, organizations should implement the following mitigations: 1) Restrict access to the OpManager web interface and uploadMib functionality to trusted IP ranges and authenticated users only. 2) Employ web application firewalls (WAFs) with custom rules to detect and block directory traversal payloads targeting the uploadMib endpoint. 3) Monitor logs for suspicious upload attempts containing directory traversal patterns or unusual file creation activities. 4) Run OpManager with the least privileges necessary, limiting filesystem write permissions to only required directories to contain potential damage. 5) Consider temporary disabling or restricting the uploadMib feature if not essential. 6) Stay alert for official patches or updates from ManageEngine and apply them promptly once available. 7) Conduct internal vulnerability scans and penetration tests focused on this vulnerability to verify mitigation effectiveness.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- talos
- Date Reserved
- 2023-11-07T15:35:52.521Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 683f0dc2182aa0cae27ff395
Added to database: 6/3/2025, 2:59:14 PM
Last enriched: 11/4/2025, 7:02:09 PM
Last updated: 12/1/2025, 11:13:04 PM
Views: 44
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-66415: CWE-441: Unintended Proxy or Intermediary ('Confused Deputy') in fastify fastify-reply-from
MediumCVE-2025-66448: CWE-94: Improper Control of Generation of Code ('Code Injection') in vllm-project vllm
HighCVE-2025-66401: CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') in kapilduraphe mcp-watch
CriticalCVE-2025-66312: CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in getgrav grav
MediumCVE-2025-66311: CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in getgrav grav
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.