![]() |
Home ▼ Bookkeeping
Online ▼ Security
Audits ▼
Managed
DNS ▼
About
Order
FAQ
Acceptable Use Policy
Dynamic DNS Clients
Configure Domains Dyanmic DNS Update Password Network
Monitor ▼
Enterprise Package
Advanced Package
Standard Package
Free Trial
FAQ
Price/Feature Summary
Order/Renew
Examples
Configure/Status Alert Profiles | ||
Test ID: | 1.3.6.1.4.1.25623.1.0.106014 |
Category: | Web application abuses |
Title: | Solarwinds FSM RCE Vulnerability |
Summary: | Solarwinds Firewall Security Manager is prone to a remote code; execution (RCE) vulnerability |
Description: | Summary: Solarwinds Firewall Security Manager is prone to a remote code execution (RCE) vulnerability Vulnerability Insight: There are two vulnerabilities in Solarwinds FSM. The first one is an authentication bypass via the Change Advisor interface due to a user-controlled session.putValue API in userlogin.jsp, allowing the attacker to set the 'username' attribute before authentication. The second problem is that the settings-new.jsp file will only check the 'username' attribute before authorizing the 'uploadFile' action, which can be exploited and allows the attacker to upload a fake xls host list file to the server, and results in arbitrary code execution under the context of SYSTEM. Vulnerability Impact: An unauthenticated attacker can obtain upload a fake xls host file to the server resulting in an arbitrary code execution under the context of SYSTEM. Affected Software/OS: Solarwinds FSM 6.6.5 and previous versions. Solution: Apply the HotFix or upgrade to a later version. CVSS Score: 10.0 CVSS Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C |
Cross-Ref: |
Common Vulnerability Exposure (CVE) ID: CVE-2015-2284 http://www.zerodayinitiative.com/advisories/ZDI-15-107/ |
Copyright | Copyright (C) 2015 Greenbone AG |
This is only one of 145615 vulnerability tests in our test suite. Find out more about running a complete security audit. To run a free test of this vulnerability against your system, register below. |