176 lines
5.6 KiB
JSON
Raw Normal View History

2023-04-24 12:24:31 +02:00
{
"id": "CVE-2021-35244",
"sourceIdentifier": "psirt@solarwinds.com",
"published": "2021-12-20T21:15:08.110",
"lastModified": "2022-03-17T17:54:31.847",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "The \"Log alert to a file\" action within action management enables any Orion Platform user with Orion alert management rights to write to any file. An attacker with Orion alert management rights could use this vulnerability to perform an unrestricted file upload causing a remote code execution."
},
{
"lang": "es",
"value": "La acci\u00f3n \"Log alert to a file\" dentro de la administraci\u00f3n de acciones permite a cualquier usuario de Orion Platform con derechos de administraci\u00f3n de alertas de Orion escribir en cualquier archivo. Un atacante con derechos de administraci\u00f3n de alertas de Orion podr\u00eda usar esta vulnerabilidad para llevar a cabo una carga de archivos sin restricciones causando una ejecuci\u00f3n de c\u00f3digo remota"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.2,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.2,
"impactScore": 5.9
},
{
"source": "psirt@solarwinds.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:H/UI:N/S:C/C:H/I:L/A:L",
"attackVector": "ADJACENT_NETWORK",
"attackComplexity": "HIGH",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "LOW",
"availabilityImpact": "LOW",
"baseScore": 6.8,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.0,
"impactScore": 5.3
}
],
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:M/Au:S/C:C/I:C/A:C",
"accessVector": "NETWORK",
"accessComplexity": "MEDIUM",
"authentication": "SINGLE",
"confidentialityImpact": "COMPLETE",
"integrityImpact": "COMPLETE",
"availabilityImpact": "COMPLETE",
"baseScore": 8.5
},
"baseSeverity": "HIGH",
"exploitabilityScore": 6.8,
"impactScore": 10.0,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-434"
}
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:solarwinds:orion_platform:*:*:*:*:*:*:*:*",
"versionEndExcluding": "2020.2.6",
"matchCriteriaId": "01CD6BD2-A53E-4AB1-A08C-00540EC437E8"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:solarwinds:orion_platform:2020.2.6:-:*:*:*:*:*:*",
"matchCriteriaId": "AD239861-0422-45EE-9A3B-EED4F87F38F7"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:solarwinds:orion_platform:2020.2.6:hotfix1:*:*:*:*:*:*",
"matchCriteriaId": "D577F745-35B0-44D8-A457-FD00C4FD4F76"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:solarwinds:orion_platform:2020.2.6:hotfix2:*:*:*:*:*:*",
"matchCriteriaId": "884E1621-E848-4769-BEF6-95A87F52A538"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA"
}
]
}
]
}
],
"references": [
{
"url": "https://documentation.solarwinds.com/en/Success_Center/orionplatform/content/core-secure-configuration.htm",
"source": "psirt@solarwinds.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://support.solarwinds.com/SuccessCenter/s/article/Orion-Platform-2020-2-6-Hotfix-3?language=en_US",
"source": "psirt@solarwinds.com",
"tags": [
"Release Notes",
"Vendor Advisory"
]
},
{
"url": "https://www.solarwinds.com/trust-center/security-advisories/cve-2021-35242",
"source": "psirt@solarwinds.com",
"tags": [
"Not Applicable",
"Vendor Advisory"
]
},
{
"url": "https://www.zerodayinitiative.com/advisories/ZDI-22-375/",
"source": "psirt@solarwinds.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
}
]
}