Lucene search

K
zdiPiotr Bazydlo (@chudypb) of Trend Micro Zero Day InitiativeZDI-24-455
HistoryMay 15, 2024 - 12:00 a.m.

SolarWinds Access Rights Manager JsonSerializationBinder Deserialization of Untrusted Data Remote Code Execution Vulnerability

2024-05-1500:00:00
Piotr Bazydlo (@chudypb) of Trend Micro Zero Day Initiative
www.zerodayinitiative.com
3
solarwinds
access rights manager
jsonserializationbinder
deserialization
untrusted data
remote code execution
vulnerability
authentication bypass
lack of validation
system context

7.7 High

AI Score

Confidence

High

0.0004 Low

EPSS

Percentile

16.1%

This vulnerability allows remote attackers to execute arbitrary code on affected installations of SolarWinds Access Rights Manager. Although authentication is required to exploit this vulnerability, the existing authentication mechanism can be bypassed. The specific flaw exists within the JsonSerializationBinder class. The issue results from the lack of proper validation of user-supplied data, which can result in deserialization of untrusted data. An attacker can leverage this vulnerability to execute code in the context of SYSTEM.

7.7 High

AI Score

Confidence

High

0.0004 Low

EPSS

Percentile

16.1%