Lucene search

K
zdiPiotr Bazydlo (@chudypb) of Trend Micro Zero Day InitiativeZDI-23-1563
HistoryOct 19, 2023 - 12:00 a.m.

SolarWinds Access Rights Manager ExecuteAction Deserialization of Untrusted Data Remote Code Execution Vulnerability

2023-10-1900:00:00
Piotr Bazydlo (@chudypb) of Trend Micro Zero Day Initiative
www.zerodayinitiative.com
6
solarwinds
access rights manager
executeaction
deserialization
untrusted data
remote code execution
vulnerability
authentication
validation
service account context

0.034 Low

EPSS

Percentile

91.5%

This vulnerability allows remote attackers to execute arbitrary code on affected installations of SolarWinds Access Rights Manager. Authentication is required to exploit this vulnerability. The specific flaw exists within the ExecuteAction method. The issue results from the lack of proper validation of user-supplied data, which can result in deserialization of untrusted data. An attacker can leverage this vulnerability to execute code in the context of the service account.

0.034 Low

EPSS

Percentile

91.5%

Related for ZDI-23-1563