![]() |
Inicial ▼ Bookkeeping
Online ▼ Auditorias ▼
DNS
Administrado ▼
Acerca de DNS
Ordenar/Renovar
Preguntas Frecuentes
AUP
Dynamic DNS Clients
Configurar Dominios Dynamic DNS Update Password Monitoreo
de Redes ▼
Enterprise
Avanzado
Estándarr
Prueba
Preguntas Frecuentes
Resumen de Precio/Funciones
Ordenar
Muestras
Configure/Status Alert Profiles | ||
ID de Prueba: | 1.3.6.1.4.1.25623.1.0.106014 |
Categoría: | Web application abuses |
Título: | Solarwinds FSM RCE Vulnerability |
Resumen: | Solarwinds Firewall Security Manager is prone to a remote code; execution (RCE) vulnerability |
Descripción: | Summary: Solarwinds Firewall Security Manager is prone to a remote code execution (RCE) vulnerability Vulnerability Insight: There are two vulnerabilities in Solarwinds FSM. The first one is an authentication bypass via the Change Advisor interface due to a user-controlled session.putValue API in userlogin.jsp, allowing the attacker to set the 'username' attribute before authentication. The second problem is that the settings-new.jsp file will only check the 'username' attribute before authorizing the 'uploadFile' action, which can be exploited and allows the attacker to upload a fake xls host list file to the server, and results in arbitrary code execution under the context of SYSTEM. Vulnerability Impact: An unauthenticated attacker can obtain upload a fake xls host file to the server resulting in an arbitrary code execution under the context of SYSTEM. Affected Software/OS: Solarwinds FSM 6.6.5 and previous versions. Solution: Apply the HotFix or upgrade to a later version. CVSS Score: 10.0 CVSS Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C |
Referencia Cruzada: |
Common Vulnerability Exposure (CVE) ID: CVE-2015-2284 http://www.zerodayinitiative.com/advisories/ZDI-15-107/ |
Copyright | Copyright (C) 2015 Greenbone AG |
Esta es sólo una de 146377 pruebas de vulnerabilidad en nuestra serie de pruebas. Encuentre más sobre cómo ejecutar una auditoría de seguridad completa. Para ejecutar una prueba gratuita de esta vulnerabilidad contra su sistema, regístrese ahora. |