CVEdetails.com the ultimate security vulnerability data source
(e.g.: CVE-2009-1234 or 2010-1234 or 20101234)
Log In   Register
  Take a third party risk management course for FREE
Vulnerability Feeds & WidgetsNew   www.itsecdb.com  

Solarwinds : Security Vulnerabilities

Press ESC to close
# CVE ID CWE ID # of Exploits Vulnerability Type(s) Publish Date Update Date Score Gained Access Level Access Complexity Authentication Conf. Integ. Avail.
1 CVE-2023-23836 502 Exec Code 2023-02-15 2023-02-24
0.0
None ??? ??? ??? ??? ??? ???
SolarWinds Platform version 2022.4.1 was found to be susceptible to the Deserialization of Untrusted Data. This vulnerability allows a remote adversary with Orion admin-level account access to the SolarWinds Web Console to execute arbitrary commands.
2 CVE-2022-47508 2023-02-15 2023-02-24
0.0
None ??? ??? ??? ??? ??? ???
Customers who had configured their polling to occur via Kerberos did not expect NTLM Traffic on their environment, but since we were querying for data via IP address this prevented us from utilizing Kerberos.
3 CVE-2022-47507 502 Exec Code 2023-02-15 2023-02-24
0.0
None ??? ??? ??? ??? ??? ???
SolarWinds Platform was susceptible to the Deserialization of Untrusted Data. This vulnerability allows a remote adversary with Orion admin-level account access to SolarWinds Web Console to execute arbitrary commands.
4 CVE-2022-47506 22 Exec Code Dir. Trav. 2023-02-15 2023-02-24
0.0
None ??? ??? ??? ??? ??? ???
SolarWinds Platform was susceptible to the Directory Traversal Vulnerability. This vulnerability allows a local adversary with authenticated account access to edit the default configuration, enabling the execution of arbitrary commands.
5 CVE-2022-47504 502 Exec Code 2023-02-15 2023-02-24
0.0
None ??? ??? ??? ??? ??? ???
SolarWinds Platform was susceptible to the Deserialization of Untrusted Data. This vulnerability allows a remote adversary with Orion admin-level account access to SolarWinds Web Console to execute arbitrary commands.
6 CVE-2022-47503 502 Exec Code 2023-02-15 2023-02-24
0.0
None ??? ??? ??? ??? ??? ???
SolarWinds Platform was susceptible to the Deserialization of Untrusted Data. This vulnerability allows a remote adversary with Orion admin-level account access to SolarWinds Web Console to execute arbitrary commands.
7 CVE-2022-47012 908 2023-01-20 2023-01-28
0.0
None ??? ??? ??? ??? ??? ???
Use of uninitialized variable in function gen_eth_recv in GNS3 dynamips 0.2.21.
8 CVE-2022-38115 436 2022-11-23 2022-11-28
0.0
None ??? ??? ??? ??? ??? ???
Insecure method vulnerability in which allowed HTTP methods are disclosed. E.g., OPTIONS, DELETE, TRACE, and PUT
9 CVE-2022-38114 XSS 2022-11-23 2022-11-28
0.0
None ??? ??? ??? ??? ??? ???
This vulnerability occurs when a web server fails to correctly process the Content-Length of POST requests. This can lead to HTTP request smuggling or XSS.
10 CVE-2022-38113 200 +Info 2022-11-23 2022-11-28
0.0
None ??? ??? ??? ??? ??? ???
This vulnerability discloses build and services versions in the server response header.
11 CVE-2022-38112 312 2023-01-20 2023-01-26
0.0
None ??? ??? ??? ??? ??? ???
In DPA 2022.4 and older releases, generated heap memory dumps contain sensitive information in cleartext.
12 CVE-2022-38111 502 Exec Code 2023-02-15 2023-02-24
0.0
None ??? ??? ??? ??? ??? ???
SolarWinds Platform was susceptible to the Deserialization of Untrusted Data. This vulnerability allows a remote adversary with Orion admin-level account access to SolarWinds Web Console to execute arbitrary commands.
13 CVE-2022-38110 79 XSS 2023-01-20 2023-01-27
0.0
None ??? ??? ??? ??? ??? ???
In Database Performance Analyzer (DPA) 2022.4 and older releases, certain URL vectors are susceptible to authenticated reflected cross-site scripting.
14 CVE-2022-38108 502 Exec Code 2022-10-20 2022-10-21
0.0
None ??? ??? ??? ??? ??? ???
SolarWinds Platform was susceptible to the Deserialization of Untrusted Data. This vulnerability allows a remote adversary with Orion admin-level account access to SolarWinds Web Console to execute arbitrary commands.
15 CVE-2022-38107 209 2022-10-19 2022-10-21
0.0
None ??? ??? ??? ??? ??? ???
Sensitive information could be displayed when a detailed technical error message is posted. This information could disclose environmental details.
16 CVE-2022-38106 79 XSS 2022-12-16 2022-12-21
0.0
None ??? ??? ??? ??? ??? ???
This vulnerability happens in the web client versions 15.3.0 to Serv-U 15.3.1. This vulnerability affects the directory creation function.
17 CVE-2022-36966 639 2022-10-20 2022-10-21
0.0
None ??? ??? ??? ??? ??? ???
Users with Node Management rights were able to view and edit all nodes due to Insufficient control on URL parameter causing insecure direct object reference (IDOR) vulnerability in SolarWinds Platform 2022.3 and previous.
18 CVE-2022-36965 79 XSS 2022-09-30 2022-10-04
0.0
None ??? ??? ??? ??? ??? ???
Insufficient sanitization of inputs in QoE application input field could lead to stored and Dom based XSS attack. This issue is fixed and released in SolarWinds Platform (2022.3.0).
19 CVE-2022-36964 502 Exec Code 2022-11-29 2022-12-01
0.0
None ??? ??? ??? ??? ??? ???
SolarWinds Platform was susceptible to the Deserialization of Untrusted Data. This vulnerability allows a remote adversary with valid access to SolarWinds Web Console to execute arbitrary commands.
20 CVE-2022-36962 77 Exec Code 2022-11-29 2022-12-01
0.0
None ??? ??? ??? ??? ??? ???
SolarWinds Platform was susceptible to Command Injection. This vulnerability allows a remote adversary with complete control over the SolarWinds database to execute arbitrary commands.
21 CVE-2022-36961 89 Exec Code Sql 2022-09-30 2022-10-04
0.0
None ??? ??? ??? ??? ??? ???
A vulnerable component of Orion Platform was vulnerable to SQL Injection, an authenticated attacker could leverage this for privilege escalation or remote code execution.
22 CVE-2022-36960 2022-11-29 2022-12-01
0.0
None ??? ??? ??? ??? ??? ???
SolarWinds Platform was susceptible to Improper Input Validation. This vulnerability allows a remote adversary with valid access to SolarWinds Web Console to escalate user privileges.
23 CVE-2022-36958 502 Exec Code 2022-10-20 2022-10-21
0.0
None ??? ??? ??? ??? ??? ???
SolarWinds Platform was susceptible to the Deserialization of Untrusted Data. This vulnerability allows a remote adversary with valid access to SolarWinds Web Console to execute arbitrary commands.
24 CVE-2022-36957 502 Exec Code 2022-10-20 2022-10-21
0.0
None ??? ??? ??? ??? ??? ???
SolarWinds Platform was susceptible to the Deserialization of Untrusted Data. This vulnerability allows a remote adversary with Orion admin-level account access to SolarWinds Web Console to execute arbitrary commands.
25 CVE-2021-35254 20 2022-03-25 2022-03-31
6.5
None Remote Low ??? Partial Partial Partial
SolarWinds received a report of a vulnerability related to an input that was not sanitized in WebHelpDesk. SolarWinds has removed this input field to prevent the misuse of this input in the future.
26 CVE-2021-35252 798 2022-12-16 2022-12-20
0.0
None ??? ??? ??? ??? ??? ???
Common encryption key appears to be used across all deployed instances of Serv-U FTP Server. Because of this an encrypted value that is exposed to an attacker can be simply recovered to plaintext.
27 CVE-2021-35251 209 2022-03-10 2022-03-15
5.0
None Remote Low Not required Partial None None
Sensitive information could be displayed when a detailed technical error message is posted. This information could disclose environmental details about the Web Help Desk installation.
28 CVE-2021-35250 22 Dir. Trav. 2022-04-25 2022-05-05
5.0
None Remote Low Not required Partial None None
A researcher reported a Directory Transversal Vulnerability in Serv-U 15.3. This may allow access to files relating to the Serv-U installation and server files. This issue has been resolved in Serv-U 15.3 Hotfix 1.
29 CVE-2021-35249 2022-05-17 2022-10-27
4.0
None Remote Low ??? Partial None None
This broken access control vulnerability pertains specifically to a domain admin who can access configuration & user data of other domains which they should not have access to. Please note the admin is unable to modify the data (read only operation). This UAC issue leads to a data leak to unauthorized users for a domain, with no log of them accessing the data unless they attempt to modify it. This read-only activity is logged to the original domain and does not specify which domain was accessed.
30 CVE-2021-35247 20 2022-01-10 2022-02-10
5.0
None Remote Low Not required None Partial None
Serv-U web login screen to LDAP authentication was allowing characters that were not sufficiently sanitized. SolarWinds has updated the input mechanism to perform additional validation and sanitization. Please Note: No downstream affect has been detected as the LDAP servers ignored improper characters. To insure proper input validation is completed in all environments. SolarWinds recommends scheduling an update to the latest version of Serv-U.
31 CVE-2021-35246 838 Bypass 2022-11-23 2022-11-28
0.0
None ??? ??? ??? ??? ??? ???
The application fails to prevent users from connecting to it over unencrypted connections. An attacker able to modify a legitimate user's network traffic could bypass the application's use of SSL/TLS encryption and use the application as a platform for attacks against its users.
32 CVE-2021-35243 2021-12-23 2022-01-07
5.0
None Remote Low Not required None Partial None
The HTTP PUT and DELETE methods were enabled in the Web Help Desk web server (12.7.7 and earlier), allowing users to execute dangerous HTTP requests. The HTTP PUT method is normally used to upload data that is saved on the server with a user-supplied URL. While the DELETE method requests that the origin server removes the association between the target resource and its current functionality. Improper use of these methods may lead to a loss of integrity.
33 CVE-2021-35242 352 CSRF 2021-12-06 2021-12-07
6.8
None Remote Medium Not required Partial Partial Partial
Serv-U server responds with valid CSRFToken when the request contains only Session.
34 CVE-2021-35239 79 XSS 2021-08-31 2021-09-08
3.5
None Remote Medium ??? None Partial None
A security researcher found a user with Orion map manage rights could store XSS through via text box hyperlink.
35 CVE-2021-35238 79 XSS 2021-09-01 2021-09-09
3.5
None Remote Medium ??? None Partial None
User with Orion Platform Admin Rights could store XSS through URL POST parameter in CreateExternalWebsite website.
36 CVE-2021-35237 2021-10-29 2021-11-03
4.3
None Remote Medium Not required None Partial None
A missing HTTP header (X-Frame-Options) in Kiwi Syslog Server has left customers vulnerable to click jacking. Clickjacking is an attack that occurs when an attacker uses a transparent iframe in a window to trick a user into clicking on an actionable item, such as a button or link, to another server in which they have an identical webpage. The attacker essentially hijacks the user activity intended for the original server and sends them to the other server. This is an attack on both the user and the server.
37 CVE-2021-35236 311 2021-10-27 2022-10-27
5.0
None Remote Low Not required Partial None None
The Secure flag is not set in the SSL Cookie of Kiwi Syslog Server 9.7.2 and previous versions. The Secure attribute tells the browser to only send the cookie if the request is being sent over a secure channel such as HTTPS. This will help protect the cookie from being passed over unencrypted requests. If the application can be accessed over both HTTP, there is a potential for the cookie can be sent in clear text.
38 CVE-2021-35235 2021-10-27 2021-10-28
5.0
None Remote Low Not required Partial None None
The ASP.NET debug feature is enabled by default in Kiwi Syslog Server 9.7.2 and previous versions. ASP.NET allows remote debugging of web applications, if configured to do so. Debug mode causes ASP.NET to compile applications with extra information. The information enables a debugger to closely monitor and control the execution of an application. If an attacker could successfully start a remote debugging session, this is likely to disclose sensitive information about the web application and supporting infrastructure that may be valuable in targeting SWI with malicious intent.
39 CVE-2021-35234 89 Sql 2021-12-20 2022-10-07
6.5
None Remote Low ??? Partial Partial Partial
Numerous exposed dangerous functions within Orion Core has allows for read-only SQL injection leading to privileged escalation. An attacker with low-user privileges may steal password hashes and password salt information.
40 CVE-2021-35233 2021-10-27 2021-10-28
5.0
None Remote Low Not required Partial None None
The HTTP TRACK & TRACE methods were enabled in Kiwi Syslog Server 9.7.1 and earlier. These methods are intended for diagnostic purposes only. If enabled, the web server will respond to requests that use these methods by returning exact HTTP request that was received in the response to the client. This may lead to the disclosure of sensitive information such as internal authentication headers appended by reverse proxies.
41 CVE-2021-35232 798 Exec Code 2021-12-27 2022-01-12
3.6
None Local Low Not required Partial Partial None
Hard coded credentials discovered in SolarWinds Web Help Desk product. Through these credentials, the attacker with local access to the Web Help Desk host machine allows to execute arbitrary HQL queries against the database and leverage the vulnerability to steal the password hashes of the users or insert arbitrary data into the database.
42 CVE-2021-35231 428 +Priv 2021-10-25 2021-10-28
4.6
None Local Low Not required Partial Partial Partial
As a result of an unquoted service path vulnerability present in the Kiwi Syslog Server Installation Wizard, a local attacker could gain escalated privileges by inserting an executable into the path of the affected service or uninstall entry. Example vulnerable path: "Computer\HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\Kiwi Syslog Server\Parameters\Application".
43 CVE-2021-35230 22 +Priv Dir. Trav. 2021-10-22 2021-10-28
7.2
None Local Low Not required Complete Complete Complete
As a result of an unquoted service path vulnerability present in the Kiwi CatTools Installation Wizard, a local attacker could gain escalated privileges by inserting an executable into the path of the affected service or uninstall entry.
44 CVE-2021-35229 79 XSS 2022-04-21 2022-05-03
4.3
None Remote Medium Not required None Partial None
Cross-site scripting vulnerability is present in Database Performance Monitor 2022.1.7779 and previous versions when using a complex SQL query
45 CVE-2021-35228 79 XSS 2021-10-21 2021-10-26
2.6
None Remote High Not required None Partial None
This vulnerability occurred due to missing input sanitization for one of the output fields that is extracted from headers on specific section of page causing a reflective cross site scripting attack. An attacker would need to perform a Man in the Middle attack in order to change header for a remote victim.
46 CVE-2021-35227 502 2021-10-21 2021-10-28
4.6
None Local Low Not required Partial Partial Partial
The HTTP interface was enabled for RabbitMQ Plugin in ARM 2020.2.6 and the ability to configure HTTPS was not available.
47 CVE-2021-35226 326 2022-10-10 2022-10-11
0.0
None ??? ??? ??? ??? ??? ???
An entity in Network Configuration Manager product is misconfigured and exposing password field to Solarwinds Information Service (SWIS). Exposed credentials are encrypted and require authenticated access with an NCM role.
48 CVE-2021-35225 2021-10-21 2022-07-12
5.5
None Remote Low ??? Partial Partial None
Each authenticated Orion Platform user in a MSP (Managed Service Provider) environment can view and browse all NetPath Services from all that MSP's customers. This can lead to any user having a limited insight into other customer's infrastructure and potential data cross-contamination.
49 CVE-2021-35223 Exec Code 2021-08-31 2021-09-16
6.5
None Remote Low ??? Partial Partial Partial
The Serv-U File Server allows for events such as user login failures to be audited by executing a command. This command can be supplied with parameters that can take the form of user string variables, allowing remote code execution.
50 CVE-2021-35220 77 Exec Code 2021-08-31 2021-09-08
6.5
None Remote Low ??? Partial Partial Partial
Command Injection vulnerability in EmailWebPage API which can lead to a Remote Code Execution (RCE) from the Alerts Settings page.
Total number of vulnerabilities : 42   Page : 1 (This Page)
CVE is a registred trademark of the MITRE Corporation and the authoritative source of CVE content is MITRE's CVE web site. CWE is a registred trademark of the MITRE Corporation and the authoritative source of CWE content is MITRE's CWE web site. OVAL is a registered trademark of The MITRE Corporation and the authoritative source of OVAL content is MITRE's OVAL web site.
Use of this information constitutes acceptance for use in an AS IS condition. There are NO warranties, implied or otherwise, with regard to this information or its use. Any use of this information is at the user's risk. It is the responsibility of user to evaluate the accuracy, completeness or usefulness of any information, opinion, advice or other content. EACH USER WILL BE SOLELY RESPONSIBLE FOR ANY consequences of his or her direct or indirect use of this web site. ALL WARRANTIES OF ANY KIND ARE EXPRESSLY DISCLAIMED. This site will NOT BE LIABLE FOR ANY DIRECT, INDIRECT or any other kind of loss.