Lucene search

K
zdiJanggggggZDI-21-1248
HistoryOct 28, 2021 - 12:00 a.m.

SolarWinds Patch Manager Chart Endpoint Deserialization of Untrusted Data Remote Code Execution Vulnerability

2021-10-2800:00:00
Jangggggg
www.zerodayinitiative.com
19
solarwinds patch manager
vulnerability
remote code execution
authentication bypass
chart endpoint
untrusted data
deserialization
network service.

EPSS

0.087

Percentile

94.6%

This vulnerability allows remote attackers to execute arbitrary code on affected installations of SolarWinds Patch Manager. Although authentication is required to exploit this vulnerability, the existing authentication mechanism can be bypassed. The specific flaw exists within the Chart endpoint. The issue results from the lack of proper validation of user-supplied data, which can result in deserialization of untrusted data. An attacker can leverage this vulnerability to execute code in the context of NETWORK SERVICE.

EPSS

0.087

Percentile

94.6%

Related for ZDI-21-1248