# |
CVE ID
|
CWE ID
|
# of Exploits
|
Vulnerability Type(s)
|
Publish Date
|
Update Date
|
Score
|
Gained Access Level
|
Access
|
Complexity
|
Authentication
|
Conf.
|
Integ.
|
Avail.
|
1 |
CVE-2023-23836 |
502 |
|
Exec Code |
2023-02-15 |
2023-02-24 |
0.0 |
None |
??? |
??? |
??? |
??? |
??? |
??? |
SolarWinds Platform version 2022.4.1 was found to be susceptible to the Deserialization of Untrusted Data. This vulnerability allows a remote adversary with Orion admin-level account access to the SolarWinds Web Console to execute arbitrary commands. |
2 |
CVE-2022-47508 |
|
|
|
2023-02-15 |
2023-02-24 |
0.0 |
None |
??? |
??? |
??? |
??? |
??? |
??? |
Customers who had configured their polling to occur via Kerberos did not expect NTLM Traffic on their environment, but since we were querying for data via IP address this prevented us from utilizing Kerberos. |
3 |
CVE-2022-47507 |
502 |
|
Exec Code |
2023-02-15 |
2023-02-24 |
0.0 |
None |
??? |
??? |
??? |
??? |
??? |
??? |
SolarWinds Platform was susceptible to the Deserialization of Untrusted Data. This vulnerability allows a remote adversary with Orion admin-level account access to SolarWinds Web Console to execute arbitrary commands. |
4 |
CVE-2022-47506 |
22 |
|
Exec Code Dir. Trav. |
2023-02-15 |
2023-02-24 |
0.0 |
None |
??? |
??? |
??? |
??? |
??? |
??? |
SolarWinds Platform was susceptible to the Directory Traversal Vulnerability. This vulnerability allows a local adversary with authenticated account access to edit the default configuration, enabling the execution of arbitrary commands. |
5 |
CVE-2022-47504 |
502 |
|
Exec Code |
2023-02-15 |
2023-02-24 |
0.0 |
None |
??? |
??? |
??? |
??? |
??? |
??? |
SolarWinds Platform was susceptible to the Deserialization of Untrusted Data. This vulnerability allows a remote adversary with Orion admin-level account access to SolarWinds Web Console to execute arbitrary commands. |
6 |
CVE-2022-47503 |
502 |
|
Exec Code |
2023-02-15 |
2023-02-24 |
0.0 |
None |
??? |
??? |
??? |
??? |
??? |
??? |
SolarWinds Platform was susceptible to the Deserialization of Untrusted Data. This vulnerability allows a remote adversary with Orion admin-level account access to SolarWinds Web Console to execute arbitrary commands. |
7 |
CVE-2022-47012 |
908 |
|
|
2023-01-20 |
2023-01-28 |
0.0 |
None |
??? |
??? |
??? |
??? |
??? |
??? |
Use of uninitialized variable in function gen_eth_recv in GNS3 dynamips 0.2.21. |
8 |
CVE-2022-38115 |
436 |
|
|
2022-11-23 |
2022-11-28 |
0.0 |
None |
??? |
??? |
??? |
??? |
??? |
??? |
Insecure method vulnerability in which allowed HTTP methods are disclosed. E.g., OPTIONS, DELETE, TRACE, and PUT |
9 |
CVE-2022-38114 |
|
|
XSS |
2022-11-23 |
2022-11-28 |
0.0 |
None |
??? |
??? |
??? |
??? |
??? |
??? |
This vulnerability occurs when a web server fails to correctly process the Content-Length of POST requests. This can lead to HTTP request smuggling or XSS. |
10 |
CVE-2022-38113 |
200 |
|
+Info |
2022-11-23 |
2022-11-28 |
0.0 |
None |
??? |
??? |
??? |
??? |
??? |
??? |
This vulnerability discloses build and services versions in the server response header. |
11 |
CVE-2022-38112 |
312 |
|
|
2023-01-20 |
2023-01-26 |
0.0 |
None |
??? |
??? |
??? |
??? |
??? |
??? |
In DPA 2022.4 and older releases, generated heap memory dumps contain sensitive information in cleartext. |
12 |
CVE-2022-38111 |
502 |
|
Exec Code |
2023-02-15 |
2023-02-24 |
0.0 |
None |
??? |
??? |
??? |
??? |
??? |
??? |
SolarWinds Platform was susceptible to the Deserialization of Untrusted Data. This vulnerability allows a remote adversary with Orion admin-level account access to SolarWinds Web Console to execute arbitrary commands. |
13 |
CVE-2022-38110 |
79 |
|
XSS |
2023-01-20 |
2023-01-27 |
0.0 |
None |
??? |
??? |
??? |
??? |
??? |
??? |
In Database Performance Analyzer (DPA) 2022.4 and older releases, certain URL vectors are susceptible to authenticated reflected cross-site scripting. |
14 |
CVE-2022-38108 |
502 |
|
Exec Code |
2022-10-20 |
2022-10-21 |
0.0 |
None |
??? |
??? |
??? |
??? |
??? |
??? |
SolarWinds Platform was susceptible to the Deserialization of Untrusted Data. This vulnerability allows a remote adversary with Orion admin-level account access to SolarWinds Web Console to execute arbitrary commands. |
15 |
CVE-2022-38107 |
209 |
|
|
2022-10-19 |
2022-10-21 |
0.0 |
None |
??? |
??? |
??? |
??? |
??? |
??? |
Sensitive information could be displayed when a detailed technical error message is posted. This information could disclose environmental details. |
16 |
CVE-2022-38106 |
79 |
|
XSS |
2022-12-16 |
2022-12-21 |
0.0 |
None |
??? |
??? |
??? |
??? |
??? |
??? |
This vulnerability happens in the web client versions 15.3.0 to Serv-U 15.3.1. This vulnerability affects the directory creation function. |
17 |
CVE-2022-36966 |
639 |
|
|
2022-10-20 |
2022-10-21 |
0.0 |
None |
??? |
??? |
??? |
??? |
??? |
??? |
Users with Node Management rights were able to view and edit all nodes due to Insufficient control on URL parameter causing insecure direct object reference (IDOR) vulnerability in SolarWinds Platform 2022.3 and previous. |
18 |
CVE-2022-36965 |
79 |
|
XSS |
2022-09-30 |
2022-10-04 |
0.0 |
None |
??? |
??? |
??? |
??? |
??? |
??? |
Insufficient sanitization of inputs in QoE application input field could lead to stored and Dom based XSS attack. This issue is fixed and released in SolarWinds Platform (2022.3.0). |
19 |
CVE-2022-36964 |
502 |
|
Exec Code |
2022-11-29 |
2022-12-01 |
0.0 |
None |
??? |
??? |
??? |
??? |
??? |
??? |
SolarWinds Platform was susceptible to the Deserialization of Untrusted Data. This vulnerability allows a remote adversary with valid access to SolarWinds Web Console to execute arbitrary commands. |
20 |
CVE-2022-36962 |
77 |
|
Exec Code |
2022-11-29 |
2022-12-01 |
0.0 |
None |
??? |
??? |
??? |
??? |
??? |
??? |
SolarWinds Platform was susceptible to Command Injection. This vulnerability allows a remote adversary with complete control over the SolarWinds database to execute arbitrary commands. |
21 |
CVE-2022-36961 |
89 |
|
Exec Code Sql |
2022-09-30 |
2022-10-04 |
0.0 |
None |
??? |
??? |
??? |
??? |
??? |
??? |
A vulnerable component of Orion Platform was vulnerable to SQL Injection, an authenticated attacker could leverage this for privilege escalation or remote code execution. |
22 |
CVE-2022-36960 |
|
|
|
2022-11-29 |
2022-12-01 |
0.0 |
None |
??? |
??? |
??? |
??? |
??? |
??? |
SolarWinds Platform was susceptible to Improper Input Validation. This vulnerability allows a remote adversary with valid access to SolarWinds Web Console to escalate user privileges. |
23 |
CVE-2022-36958 |
502 |
|
Exec Code |
2022-10-20 |
2022-10-21 |
0.0 |
None |
??? |
??? |
??? |
??? |
??? |
??? |
SolarWinds Platform was susceptible to the Deserialization of Untrusted Data. This vulnerability allows a remote adversary with valid access to SolarWinds Web Console to execute arbitrary commands. |
24 |
CVE-2022-36957 |
502 |
|
Exec Code |
2022-10-20 |
2022-10-21 |
0.0 |
None |
??? |
??? |
??? |
??? |
??? |
??? |
SolarWinds Platform was susceptible to the Deserialization of Untrusted Data. This vulnerability allows a remote adversary with Orion admin-level account access to SolarWinds Web Console to execute arbitrary commands. |
25 |
CVE-2021-35254 |
20 |
|
|
2022-03-25 |
2022-03-31 |
6.5 |
None |
Remote |
Low |
??? |
Partial |
Partial |
Partial |
SolarWinds received a report of a vulnerability related to an input that was not sanitized in WebHelpDesk. SolarWinds has removed this input field to prevent the misuse of this input in the future. |
26 |
CVE-2021-35252 |
798 |
|
|
2022-12-16 |
2022-12-20 |
0.0 |
None |
??? |
??? |
??? |
??? |
??? |
??? |
Common encryption key appears to be used across all deployed instances of Serv-U FTP Server. Because of this an encrypted value that is exposed to an attacker can be simply recovered to plaintext. |
27 |
CVE-2021-35251 |
209 |
|
|
2022-03-10 |
2022-03-15 |
5.0 |
None |
Remote |
Low |
Not required |
Partial |
None |
None |
Sensitive information could be displayed when a detailed technical error message is posted. This information could disclose environmental details about the Web Help Desk installation. |
28 |
CVE-2021-35250 |
22 |
|
Dir. Trav. |
2022-04-25 |
2022-05-05 |
5.0 |
None |
Remote |
Low |
Not required |
Partial |
None |
None |
A researcher reported a Directory Transversal Vulnerability in Serv-U 15.3. This may allow access to files relating to the Serv-U installation and server files. This issue has been resolved in Serv-U 15.3 Hotfix 1. |
29 |
CVE-2021-35249 |
|
|
|
2022-05-17 |
2022-10-27 |
4.0 |
None |
Remote |
Low |
??? |
Partial |
None |
None |
This broken access control vulnerability pertains specifically to a domain admin who can access configuration & user data of other domains which they should not have access to. Please note the admin is unable to modify the data (read only operation). This UAC issue leads to a data leak to unauthorized users for a domain, with no log of them accessing the data unless they attempt to modify it. This read-only activity is logged to the original domain and does not specify which domain was accessed. |
30 |
CVE-2021-35247 |
20 |
|
|
2022-01-10 |
2022-02-10 |
5.0 |
None |
Remote |
Low |
Not required |
None |
Partial |
None |
Serv-U web login screen to LDAP authentication was allowing characters that were not sufficiently sanitized. SolarWinds has updated the input mechanism to perform additional validation and sanitization. Please Note: No downstream affect has been detected as the LDAP servers ignored improper characters. To insure proper input validation is completed in all environments. SolarWinds recommends scheduling an update to the latest version of Serv-U. |
31 |
CVE-2021-35246 |
838 |
|
Bypass |
2022-11-23 |
2022-11-28 |
0.0 |
None |
??? |
??? |
??? |
??? |
??? |
??? |
The application fails to prevent users from connecting to it over unencrypted connections. An attacker able to modify a legitimate user's network traffic could bypass the application's use of SSL/TLS encryption and use the application as a platform for attacks against its users. |
32 |
CVE-2021-35243 |
|
|
|
2021-12-23 |
2022-01-07 |
5.0 |
None |
Remote |
Low |
Not required |
None |
Partial |
None |
The HTTP PUT and DELETE methods were enabled in the Web Help Desk web server (12.7.7 and earlier), allowing users to execute dangerous HTTP requests. The HTTP PUT method is normally used to upload data that is saved on the server with a user-supplied URL. While the DELETE method requests that the origin server removes the association between the target resource and its current functionality. Improper use of these methods may lead to a loss of integrity. |
33 |
CVE-2021-35242 |
352 |
|
CSRF |
2021-12-06 |
2021-12-07 |
6.8 |
None |
Remote |
Medium |
Not required |
Partial |
Partial |
Partial |
Serv-U server responds with valid CSRFToken when the request contains only Session. |
34 |
CVE-2021-35239 |
79 |
|
XSS |
2021-08-31 |
2021-09-08 |
3.5 |
None |
Remote |
Medium |
??? |
None |
Partial |
None |
A security researcher found a user with Orion map manage rights could store XSS through via text box hyperlink. |
35 |
CVE-2021-35238 |
79 |
|
XSS |
2021-09-01 |
2021-09-09 |
3.5 |
None |
Remote |
Medium |
??? |
None |
Partial |
None |
User with Orion Platform Admin Rights could store XSS through URL POST parameter in CreateExternalWebsite website. |
36 |
CVE-2021-35237 |
|
|
|
2021-10-29 |
2021-11-03 |
4.3 |
None |
Remote |
Medium |
Not required |
None |
Partial |
None |
A missing HTTP header (X-Frame-Options) in Kiwi Syslog Server has left customers vulnerable to click jacking. Clickjacking is an attack that occurs when an attacker uses a transparent iframe in a window to trick a user into clicking on an actionable item, such as a button or link, to another server in which they have an identical webpage. The attacker essentially hijacks the user activity intended for the original server and sends them to the other server. This is an attack on both the user and the server. |
37 |
CVE-2021-35236 |
311 |
|
|
2021-10-27 |
2022-10-27 |
5.0 |
None |
Remote |
Low |
Not required |
Partial |
None |
None |
The Secure flag is not set in the SSL Cookie of Kiwi Syslog Server 9.7.2 and previous versions. The Secure attribute tells the browser to only send the cookie if the request is being sent over a secure channel such as HTTPS. This will help protect the cookie from being passed over unencrypted requests. If the application can be accessed over both HTTP, there is a potential for the cookie can be sent in clear text. |
38 |
CVE-2021-35235 |
|
|
|
2021-10-27 |
2021-10-28 |
5.0 |
None |
Remote |
Low |
Not required |
Partial |
None |
None |
The ASP.NET debug feature is enabled by default in Kiwi Syslog Server 9.7.2 and previous versions. ASP.NET allows remote debugging of web applications, if configured to do so. Debug mode causes ASP.NET to compile applications with extra information. The information enables a debugger to closely monitor and control the execution of an application. If an attacker could successfully start a remote debugging session, this is likely to disclose sensitive information about the web application and supporting infrastructure that may be valuable in targeting SWI with malicious intent. |
39 |
CVE-2021-35234 |
89 |
|
Sql |
2021-12-20 |
2022-10-07 |
6.5 |
None |
Remote |
Low |
??? |
Partial |
Partial |
Partial |
Numerous exposed dangerous functions within Orion Core has allows for read-only SQL injection leading to privileged escalation. An attacker with low-user privileges may steal password hashes and password salt information. |
40 |
CVE-2021-35233 |
|
|
|
2021-10-27 |
2021-10-28 |
5.0 |
None |
Remote |
Low |
Not required |
Partial |
None |
None |
The HTTP TRACK & TRACE methods were enabled in Kiwi Syslog Server 9.7.1 and earlier. These methods are intended for diagnostic purposes only. If enabled, the web server will respond to requests that use these methods by returning exact HTTP request that was received in the response to the client. This may lead to the disclosure of sensitive information such as internal authentication headers appended by reverse proxies. |
41 |
CVE-2021-35232 |
798 |
|
Exec Code |
2021-12-27 |
2022-01-12 |
3.6 |
None |
Local |
Low |
Not required |
Partial |
Partial |
None |
Hard coded credentials discovered in SolarWinds Web Help Desk product. Through these credentials, the attacker with local access to the Web Help Desk host machine allows to execute arbitrary HQL queries against the database and leverage the vulnerability to steal the password hashes of the users or insert arbitrary data into the database. |
42 |
CVE-2021-35231 |
428 |
|
+Priv |
2021-10-25 |
2021-10-28 |
4.6 |
None |
Local |
Low |
Not required |
Partial |
Partial |
Partial |
As a result of an unquoted service path vulnerability present in the Kiwi Syslog Server Installation Wizard, a local attacker could gain escalated privileges by inserting an executable into the path of the affected service or uninstall entry. Example vulnerable path: "Computer\HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\Kiwi Syslog Server\Parameters\Application". |
43 |
CVE-2021-35230 |
22 |
|
+Priv Dir. Trav. |
2021-10-22 |
2021-10-28 |
7.2 |
None |
Local |
Low |
Not required |
Complete |
Complete |
Complete |
As a result of an unquoted service path vulnerability present in the Kiwi CatTools Installation Wizard, a local attacker could gain escalated privileges by inserting an executable into the path of the affected service or uninstall entry. |
44 |
CVE-2021-35229 |
79 |
|
XSS |
2022-04-21 |
2022-05-03 |
4.3 |
None |
Remote |
Medium |
Not required |
None |
Partial |
None |
Cross-site scripting vulnerability is present in Database Performance Monitor 2022.1.7779 and previous versions when using a complex SQL query |
45 |
CVE-2021-35228 |
79 |
|
XSS |
2021-10-21 |
2021-10-26 |
2.6 |
None |
Remote |
High |
Not required |
None |
Partial |
None |
This vulnerability occurred due to missing input sanitization for one of the output fields that is extracted from headers on specific section of page causing a reflective cross site scripting attack. An attacker would need to perform a Man in the Middle attack in order to change header for a remote victim. |
46 |
CVE-2021-35227 |
502 |
|
|
2021-10-21 |
2021-10-28 |
4.6 |
None |
Local |
Low |
Not required |
Partial |
Partial |
Partial |
The HTTP interface was enabled for RabbitMQ Plugin in ARM 2020.2.6 and the ability to configure HTTPS was not available. |
47 |
CVE-2021-35226 |
326 |
|
|
2022-10-10 |
2022-10-11 |
0.0 |
None |
??? |
??? |
??? |
??? |
??? |
??? |
An entity in Network Configuration Manager product is misconfigured and exposing password field to Solarwinds Information Service (SWIS). Exposed credentials are encrypted and require authenticated access with an NCM role. |
48 |
CVE-2021-35225 |
|
|
|
2021-10-21 |
2022-07-12 |
5.5 |
None |
Remote |
Low |
??? |
Partial |
Partial |
None |
Each authenticated Orion Platform user in a MSP (Managed Service Provider) environment can view and browse all NetPath Services from all that MSP's customers. This can lead to any user having a limited insight into other customer's infrastructure and potential data cross-contamination. |
49 |
CVE-2021-35223 |
|
|
Exec Code |
2021-08-31 |
2021-09-16 |
6.5 |
None |
Remote |
Low |
??? |
Partial |
Partial |
Partial |
The Serv-U File Server allows for events such as user login failures to be audited by executing a command. This command can be supplied with parameters that can take the form of user string variables, allowing remote code execution. |
50 |
CVE-2021-35220 |
77 |
|
Exec Code |
2021-08-31 |
2021-09-08 |
6.5 |
None |
Remote |
Low |
??? |
Partial |
Partial |
Partial |
Command Injection vulnerability in EmailWebPage API which can lead to a Remote Code Execution (RCE) from the Alerts Settings page. |