2024-02-06 17:00:42 +00:00
{
"id" : "CVE-2023-35188" ,
"sourceIdentifier" : "psirt@solarwinds.com" ,
"published" : "2024-02-06T16:15:51.140" ,
2024-12-08 03:06:42 +00:00
"lastModified" : "2024-11-21T08:08:07.530" ,
2025-03-02 03:03:52 +00:00
"vulnStatus" : "Analyzed" ,
2024-07-14 02:06:08 +00:00
"cveTags" : [ ] ,
2024-02-06 17:00:42 +00:00
"descriptions" : [
{
"lang" : "en" ,
"value" : "\nSQL Injection Remote Code Execution Vulnerability was found using a create statement in the SolarWinds Platform. This vulnerability requires user authentication to be exploited."
2024-02-13 21:00:28 +00:00
} ,
{
"lang" : "es" ,
"value" : "La vulnerabilidad de ejecuci\u00f3n remota de c\u00f3digo de inyecci\u00f3n SQL se encontr\u00f3 mediante una declaraci\u00f3n de creaci\u00f3n en la plataforma SolarWinds. Esta vulnerabilidad requiere que se aproveche la autenticaci\u00f3n del usuario."
2024-02-06 17:00:42 +00:00
}
] ,
"metrics" : {
"cvssMetricV31" : [
{
2024-12-08 03:06:42 +00:00
"source" : "psirt@solarwinds.com" ,
"type" : "Secondary" ,
2024-02-13 21:00:28 +00:00
"cvssData" : {
"version" : "3.1" ,
2024-12-08 03:06:42 +00:00
"vectorString" : "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" ,
"baseScore" : 8.0 ,
"baseSeverity" : "HIGH" ,
"attackVector" : "ADJACENT_NETWORK" ,
2024-02-13 21:00:28 +00:00
"attackComplexity" : "LOW" ,
"privilegesRequired" : "LOW" ,
"userInteraction" : "NONE" ,
"scope" : "UNCHANGED" ,
"confidentialityImpact" : "HIGH" ,
"integrityImpact" : "HIGH" ,
2024-12-08 03:06:42 +00:00
"availabilityImpact" : "HIGH"
2024-02-13 21:00:28 +00:00
} ,
2024-12-08 03:06:42 +00:00
"exploitabilityScore" : 2.1 ,
2024-02-13 21:00:28 +00:00
"impactScore" : 5.9
} ,
{
2024-12-08 03:06:42 +00:00
"source" : "nvd@nist.gov" ,
"type" : "Primary" ,
2024-02-06 17:00:42 +00:00
"cvssData" : {
"version" : "3.1" ,
2025-03-02 03:03:52 +00:00
"vectorString" : "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" ,
"baseScore" : 8.0 ,
2024-12-08 03:06:42 +00:00
"baseSeverity" : "HIGH" ,
2025-03-02 03:03:52 +00:00
"attackVector" : "ADJACENT_NETWORK" ,
2024-02-06 17:00:42 +00:00
"attackComplexity" : "LOW" ,
"privilegesRequired" : "LOW" ,
"userInteraction" : "NONE" ,
"scope" : "UNCHANGED" ,
"confidentialityImpact" : "HIGH" ,
"integrityImpact" : "HIGH" ,
2024-12-08 03:06:42 +00:00
"availabilityImpact" : "HIGH"
2024-02-06 17:00:42 +00:00
} ,
2025-03-02 03:03:52 +00:00
"exploitabilityScore" : 2.1 ,
2024-02-06 17:00:42 +00:00
"impactScore" : 5.9
}
]
} ,
"weaknesses" : [
{
"source" : "psirt@solarwinds.com" ,
2024-12-15 03:03:56 +00:00
"type" : "Primary" ,
2024-02-06 17:00:42 +00:00
"description" : [
{
"lang" : "en" ,
"value" : "CWE-89"
}
]
}
] ,
2024-02-13 21:00:28 +00:00
"configurations" : [
{
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:solarwinds:solarwinds_platform:*:*:*:*:*:*:*:*" ,
"versionEndExcluding" : "2024.1" ,
"matchCriteriaId" : "C0CDF2DF-6E3D-4748-AA12-94A3419289FB"
}
]
}
]
}
] ,
2024-02-06 17:00:42 +00:00
"references" : [
{
"url" : "https://documentation.solarwinds.com/en/success_center/orionplatform/content/release_notes/solarwinds_platform_2024-1_release_notes.htm" ,
2024-02-13 21:00:28 +00:00
"source" : "psirt@solarwinds.com" ,
"tags" : [
"Release Notes"
]
2024-02-06 17:00:42 +00:00
} ,
{
"url" : "https://www.solarwinds.com/trust-center/security-advisories/CVE-2023-35188" ,
2024-02-13 21:00:28 +00:00
"source" : "psirt@solarwinds.com" ,
"tags" : [
"Vendor Advisory"
]
2024-12-08 03:06:42 +00:00
} ,
{
"url" : "https://documentation.solarwinds.com/en/success_center/orionplatform/content/release_notes/solarwinds_platform_2024-1_release_notes.htm" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108" ,
"tags" : [
"Release Notes"
]
} ,
{
"url" : "https://www.solarwinds.com/trust-center/security-advisories/CVE-2023-35188" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108" ,
"tags" : [
"Vendor Advisory"
]
2024-02-06 17:00:42 +00:00
}
]
}