CVE-2020-12116

CVSS V2 Medium 5 CVSS V3 High 7.5
Description
Zoho ManageEngine OpManager Stable build before 124196 and Released build before 125125 allows an unauthenticated attacker to read arbitrary files on the server by sending a crafted request.
Overview
  • CVE ID
  • CVE-2020-12116
  • Assigner
  • cve@mitre.org
  • Vulnerability Status
  • Analyzed
  • Published Version
  • 2020-05-07T20:15:12
  • Last Modified Date
  • 2021-07-21T11:39:23
CPE Configuration (Product)
CPE Vulnerable Operator Version Start Version End
cpe:2.3:a:zohocorp:manageengine_opmanager:*:*:*:*:*:*:*:* 1 OR 12.3
cpe:2.3:a:zohocorp:manageengine_opmanager:12.4:-:*:*:*:*:*:* 1 OR
cpe:2.3:a:zohocorp:manageengine_opmanager:12.4:build124000:*:*:*:*:*:* 1 OR
cpe:2.3:a:zohocorp:manageengine_opmanager:12.4:build124011:*:*:*:*:*:* 1 OR
cpe:2.3:a:zohocorp:manageengine_opmanager:12.4:build124012:*:*:*:*:*:* 1 OR
cpe:2.3:a:zohocorp:manageengine_opmanager:12.4:build124013:*:*:*:*:*:* 1 OR
cpe:2.3:a:zohocorp:manageengine_opmanager:12.4:build124014:*:*:*:*:*:* 1 OR
cpe:2.3:a:zohocorp:manageengine_opmanager:12.4:build124015:*:*:*:*:*:* 1 OR
cpe:2.3:a:zohocorp:manageengine_opmanager:12.4:build124016:*:*:*:*:*:* 1 OR
cpe:2.3:a:zohocorp:manageengine_opmanager:12.4:build124022:*:*:*:*:*:* 1 OR
cpe:2.3:a:zohocorp:manageengine_opmanager:12.4:build124023:*:*:*:*:*:* 1 OR
cpe:2.3:a:zohocorp:manageengine_opmanager:12.4:build124024:*:*:*:*:*:* 1 OR
cpe:2.3:a:zohocorp:manageengine_opmanager:12.4:build124025:*:*:*:*:*:* 1 OR
cpe:2.3:a:zohocorp:manageengine_opmanager:12.4:build124026:*:*:*:*:*:* 1 OR
cpe:2.3:a:zohocorp:manageengine_opmanager:12.4:build124027:*:*:*:*:*:* 1 OR
cpe:2.3:a:zohocorp:manageengine_opmanager:12.4:build124030:*:*:*:*:*:* 1 OR
cpe:2.3:a:zohocorp:manageengine_opmanager:12.4:build124033:*:*:*:*:*:* 1 OR
cpe:2.3:a:zohocorp:manageengine_opmanager:12.4:build124037:*:*:*:*:*:* 1 OR
cpe:2.3:a:zohocorp:manageengine_opmanager:12.4:build124039:*:*:*:*:*:* 1 OR
cpe:2.3:a:zohocorp:manageengine_opmanager:12.4:build124040:*:*:*:*:*:* 1 OR
cpe:2.3:a:zohocorp:manageengine_opmanager:12.4:build124041:*:*:*:*:*:* 1 OR
cpe:2.3:a:zohocorp:manageengine_opmanager:12.4:build124042:*:*:*:*:*:* 1 OR
cpe:2.3:a:zohocorp:manageengine_opmanager:12.4:build124043:*:*:*:*:*:* 1 OR
cpe:2.3:a:zohocorp:manageengine_opmanager:12.4:build124051:*:*:*:*:*:* 1 OR
cpe:2.3:a:zohocorp:manageengine_opmanager:12.4:build124053:*:*:*:*:*:* 1 OR
cpe:2.3:a:zohocorp:manageengine_opmanager:12.4:build124054:*:*:*:*:*:* 1 OR
cpe:2.3:a:zohocorp:manageengine_opmanager:12.4:build124056:*:*:*:*:*:* 1 OR
cpe:2.3:a:zohocorp:manageengine_opmanager:12.4:build124058:*:*:*:*:*:* 1 OR
cpe:2.3:a:zohocorp:manageengine_opmanager:12.4:build124065:*:*:*:*:*:* 1 OR
cpe:2.3:a:zohocorp:manageengine_opmanager:12.4:build124066:*:*:*:*:*:* 1 OR
cpe:2.3:a:zohocorp:manageengine_opmanager:12.4:build124067:*:*:*:*:*:* 1 OR
cpe:2.3:a:zohocorp:manageengine_opmanager:12.4:build124069:*:*:*:*:*:* 1 OR
cpe:2.3:a:zohocorp:manageengine_opmanager:12.4:build124070:*:*:*:*:*:* 1 OR
cpe:2.3:a:zohocorp:manageengine_opmanager:12.4:build124071:*:*:*:*:*:* 1 OR
cpe:2.3:a:zohocorp:manageengine_opmanager:12.4:build124072:*:*:*:*:*:* 1 OR
cpe:2.3:a:zohocorp:manageengine_opmanager:12.4:build124074:*:*:*:*:*:* 1 OR
cpe:2.3:a:zohocorp:manageengine_opmanager:12.4:build124075:*:*:*:*:*:* 1 OR
cpe:2.3:a:zohocorp:manageengine_opmanager:12.4:build124081:*:*:*:*:*:* 1 OR
cpe:2.3:a:zohocorp:manageengine_opmanager:12.4:build124082:*:*:*:*:*:* 1 OR
cpe:2.3:a:zohocorp:manageengine_opmanager:12.4:build124085:*:*:*:*:*:* 1 OR
cpe:2.3:a:zohocorp:manageengine_opmanager:12.4:build124086:*:*:*:*:*:* 1 OR
cpe:2.3:a:zohocorp:manageengine_opmanager:12.4:build124087:*:*:*:*:*:* 1 OR
cpe:2.3:a:zohocorp:manageengine_opmanager:12.4:build124089:*:*:*:*:*:* 1 OR
cpe:2.3:a:zohocorp:manageengine_opmanager:12.4:build124095:*:*:*:*:*:* 1 OR
cpe:2.3:a:zohocorp:manageengine_opmanager:12.4:build124096:*:*:*:*:*:* 1 OR
cpe:2.3:a:zohocorp:manageengine_opmanager:12.4:build124097:*:*:*:*:*:* 1 OR
cpe:2.3:a:zohocorp:manageengine_opmanager:12.4:build124098:*:*:*:*:*:* 1 OR
cpe:2.3:a:zohocorp:manageengine_opmanager:12.4:build124099:*:*:*:*:*:* 1 OR
cpe:2.3:a:zohocorp:manageengine_opmanager:12.4:build124100:*:*:*:*:*:* 1 OR
cpe:2.3:a:zohocorp:manageengine_opmanager:12.4:build124101:*:*:*:*:*:* 1 OR
cpe:2.3:a:zohocorp:manageengine_opmanager:12.4:build124102:*:*:*:*:*:* 1 OR
cpe:2.3:a:zohocorp:manageengine_opmanager:12.4:build124168:*:*:*:*:*:* 1 OR
cpe:2.3:a:zohocorp:manageengine_opmanager:12.4:build124169:*:*:*:*:*:* 1 OR
cpe:2.3:a:zohocorp:manageengine_opmanager:12.4:build124175:*:*:*:*:*:* 1 OR
cpe:2.3:a:zohocorp:manageengine_opmanager:12.4:build124176:*:*:*:*:*:* 1 OR
cpe:2.3:a:zohocorp:manageengine_opmanager:12.4:build124178:*:*:*:*:*:* 1 OR
cpe:2.3:a:zohocorp:manageengine_opmanager:12.4:build124181:*:*:*:*:*:* 1 OR
cpe:2.3:a:zohocorp:manageengine_opmanager:12.4:build124182:*:*:*:*:*:* 1 OR
cpe:2.3:a:zohocorp:manageengine_opmanager:12.4:build124183:*:*:*:*:*:* 1 OR
cpe:2.3:a:zohocorp:manageengine_opmanager:12.4:build124189:*:*:*:*:*:* 1 OR
cpe:2.3:a:zohocorp:manageengine_opmanager:12.4:build124190:*:*:*:*:*:* 1 OR
cpe:2.3:a:zohocorp:manageengine_opmanager:12.4:build124191:*:*:*:*:*:* 1 OR
cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125000:*:*:*:*:*:* 1 OR
cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125002:*:*:*:*:*:* 1 OR
cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125100:*:*:*:*:*:* 1 OR
cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125101:*:*:*:*:*:* 1 OR
cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125102:*:*:*:*:*:* 1 OR
cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125108:*:*:*:*:*:* 1 OR
cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125110:*:*:*:*:*:* 1 OR
cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125111:*:*:*:*:*:* 1 OR
cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125112:*:*:*:*:*:* 1 OR
cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125113:*:*:*:*:*:* 1 OR
cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125114:*:*:*:*:*:* 1 OR
cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125116:*:*:*:*:*:* 1 OR
cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125117:*:*:*:*:*:* 1 OR
cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125118:*:*:*:*:*:* 1 OR
cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125120:*:*:*:*:*:* 1 OR
cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125121:*:*:*:*:*:* 1 OR
cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125123:*:*:*:*:*:* 1 OR
cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125124:*:*:*:*:*:* 1 OR
CVSS Version 2
  • Version
  • 2.0
  • Vector String
  • AV:N/AC:L/Au:N/C:P/I:N/A:N
  • Access Vector
  • NETWORK
  • Access Compatibility
  • LOW
  • Authentication
  • NONE
  • Confidentiality Impact
  • PARTIAL
  • Integrity Impact
  • NONE
  • Availability Impact
  • NONE
  • Base Score
  • 5
  • Severity
  • MEDIUM
  • Exploitability Score
  • 10
  • Impact Score
  • 2.9
CVSS Version 3
  • Version
  • 3.1
  • Vector String
  • CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
  • Attack Vector
  • NETWORK
  • Attack Compatibility
  • LOW
  • Privileges Required
  • NONE
  • User Interaction
  • NONE
  • Scope
  • UNCHANGED
  • Confidentiality Impact
  • HIGH
  • Availability Impact
  • NONE
  • Base Score
  • 7.5
  • Base Severity
  • HIGH
  • Exploitability Score
  • 3.9
  • Impact Score
  • 3.6
History
Created Old Value New Value Data Type Notes
2022-05-10 07:01:42 Added to TrackCVE
2022-12-04 16:16:12 2020-05-07T20:15Z 2020-05-07T20:15:12 CVE Published Date updated
2022-12-04 16:16:12 2021-07-21T11:39:23 CVE Modified Date updated
2022-12-04 16:16:12 Analyzed Vulnerability Status updated