Lucene search

K
zdiSina Kheirkhah (@SinSinology) of Summoning Team (@SummoningTeam)ZDI-23-1567
HistoryOct 19, 2023 - 12:00 a.m.

SolarWinds Access Rights Manager OpenClientUpdateFile Directory Traversal Remote Code Execution Vulnerability

2023-10-1900:00:00
Sina Kheirkhah (@SinSinology) of Summoning Team (@SummoningTeam)
www.zerodayinitiative.com
11
solarwinds} {access rights manager} {remote code execution} {vulnerability} {directory traversal} {authentication bypass} {file operations} {arbitrary code execution} {system context

0.014 Low

EPSS

Percentile

86.6%

This vulnerability allows remote attackers to execute arbitrary code on affected installations of SolarWinds Access Rights Manager. Authentication is not required to exploit this vulnerability. The specific flaw exists within the OpenClientUpdateFile method. The issue results from the lack of proper validation of a user-supplied path prior to using it in file operations. An attacker can leverage this vulnerability to execute code in the context of SYSTEM.

0.014 Low

EPSS

Percentile

86.6%

Related for ZDI-23-1567