Lucene search

K
nessusThis script is Copyright (C) 2021-2022 and is owned by Tenable, Inc. or an Affiliate thereof.SOLARWINDS_ORION_2020_2_5.NASL
HistoryMar 26, 2021 - 12:00 a.m.

SolarWinds Orion Platform < 2020.2.5 Multiple Vulnerabilities

2021-03-2600:00:00
This script is Copyright (C) 2021-2022 and is owned by Tenable, Inc. or an Affiliate thereof.
www.tenable.com
48
solarwinds
orion platform
vulnerabilities
reverse tabnabbing
open redirect
stored xss
remote code execution
job scheduler
administrator account

CVSS2

4.9

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

SINGLE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:M/Au:S/C:P/I:P/A:N

CVSS3

4.8

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

HIGH

User Interaction

REQUIRED

Scope

CHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N

EPSS

0.001

Percentile

22.7%

According to its self-reported version number, the version of SolarWinds Orion Platform is prior to 2020.2.5. It is, therefore, affected by multiple vulnerabilities:

  • A reverse tabnabbing and open redirect vulnerability was found in the custom menu item options page. This vulnerability requires an Orion administrator account to exploit this. (CVE-2021-3109)

  • A stored XSS vulnerability was found in the add custom tab within the customize view page. This vulnerability requires Orion administrator account to exploit this. (CVE-2020-35856)

  • A remote code execution vulnerability has been found via the test alert actions. An Orion authenticated user is required to exploit this issue via actions and JSON deserialization to execute arbitrary commands.

  • A remote code execution (RCE) vulnerability exists in the Job Scheduler. An authenticated attacker can exploit this issue to achieve authenticated RCE as Administrator. In order to exploit this, an attacker first needs to know the credentials of an unprivileged local account on the Orion Server.

Note that Nessus has not tested for this issue but has instead relied only on the application’s self-reported version number.

##
# (C) Tenable Network Security, Inc.
##

include('compat.inc');

if (description)
{
  script_id(148180);
  script_version("1.4");
  script_set_attribute(attribute:"plugin_modification_date", value:"2022/01/26");

  script_cve_id("CVE-2020-35856", "CVE-2021-3109");
  script_xref(name:"IAVA", value:"2021-A-0151-S");

  script_name(english:"SolarWinds Orion Platform < 2020.2.5 Multiple Vulnerabilities");

  script_set_attribute(attribute:"synopsis", value:
"An application running on the remote host is affected by Multiple Vulnerabilities.");
  script_set_attribute(attribute:"description", value:
"According to its self-reported version number, the version of SolarWinds Orion Platform is prior to 2020.2.5. It is,
therefore, affected by multiple vulnerabilities:

  - A reverse tabnabbing and open redirect vulnerability was found in the custom menu item options page. This
    vulnerability requires an Orion administrator account to exploit this. (CVE-2021-3109)

  - A stored XSS vulnerability was found in the add custom tab within the customize view page. This
    vulnerability requires Orion administrator account to exploit this. (CVE-2020-35856)

  - A remote code execution vulnerability has been found via the test alert actions. An Orion authenticated
    user is required to exploit this issue via actions and JSON deserialization to execute arbitrary commands.

  - A remote code execution (RCE) vulnerability exists in the Job Scheduler. An authenticated attacker can
    exploit this issue to achieve authenticated RCE as Administrator. In order to exploit this, an attacker
    first needs to know the credentials of an unprivileged local account on the Orion Server.

Note that Nessus has not tested for this issue but has instead relied only on the application's self-reported version   
number.");
  # https://documentation.solarwinds.com/en/Success_Center/orionplatform/content/release_notes/orion_platform_2020-2-5_release_notes.htm
  script_set_attribute(attribute:"see_also", value:"http://www.nessus.org/u?01e604ba");
  script_set_attribute(attribute:"solution", value:
"Upgrade to SolarWinds Orion Platform 2020.2.5 or later.");
  script_set_attribute(attribute:"agent", value:"windows");
  script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:S/C:C/I:C/A:C");
  script_set_cvss_temporal_vector("CVSS2#E:U/RL:OF/RC:C");
  script_set_cvss3_base_vector("CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H");
  script_set_cvss3_temporal_vector("CVSS:3.0/E:U/RL:O/RC:C");
  script_set_attribute(attribute:"cvss_score_source", value:"manual");
  script_set_attribute(attribute:"cvss_score_rationale", value:"Score based on analysis of the vendor advisory");

  script_set_attribute(attribute:"exploitability_ease", value:"No known exploits are available");

  script_set_attribute(attribute:"vuln_publication_date", value:"2021/03/25");
  script_set_attribute(attribute:"patch_publication_date", value:"2021/03/25");
  script_set_attribute(attribute:"plugin_publication_date", value:"2021/03/26");

  script_set_attribute(attribute:"plugin_type", value:"combined");
  script_set_attribute(attribute:"cpe", value:"cpe:/a:solarwinds:orion_platform");
  script_set_attribute(attribute:"stig_severity", value:"I");
  script_end_attributes();

  script_category(ACT_GATHER_INFO);
  script_family(english:"CGI abuses");

  script_copyright(english:"This script is Copyright (C) 2021-2022 and is owned by Tenable, Inc. or an Affiliate thereof.");

  script_dependencies("solarwinds_orion_npm_detect.nasl", "solarwinds_orion_installed.nbin");
  script_require_keys("installed_sw/SolarWinds Orion Core");

  exit(0);
}

include('vcf.inc');
include('vcf_extras.inc');

vcf::solarwinds_orion::initialize();
app_info = vcf::solarwinds_orion::combined_get_app_info();

constraints = [
  { 'min_version' : '2020.0', 'fixed_version' : '2020.2.5' }
];

vcf::check_version_and_report(app_info:app_info, constraints:constraints, severity:SECURITY_HOLE, flags:{xss:true});

CVSS2

4.9

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

SINGLE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:M/Au:S/C:P/I:P/A:N

CVSS3

4.8

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

HIGH

User Interaction

REQUIRED

Scope

CHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N

EPSS

0.001

Percentile

22.7%

Related for SOLARWINDS_ORION_2020_2_5.NASL