7.2 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
HIGH
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
6.5 Medium
AI Score
Confidence
High
0.001 Low
EPSS
Percentile
48.3%
The version of SolarWinds Platform installed on the remote host is prior to 2023.3. It is, therefore, affected by multiple vulnerabilities as referenced in the solarwinds_platform_2023_3 advisory.
Access Control Bypass Vulnerability in the SolarWinds Platform that allows an underprivileged user to read arbitrary resource (CVE-2023-3622)
The SolarWinds Platform was susceptible to the Incorrect Behavior Order Vulnerability. This vulnerability allows users with administrative access to SolarWinds Web Console to execute arbitrary commands with NETWORK SERVICE privileges. (CVE-2023-33224)
The SolarWinds Platform was susceptible to the Incorrect Input Neutralization Vulnerability. This vulnerability allows a remote adversary with a valid SolarWinds Platform account to append URL parameters to inject passive HTML. (CVE-2023-33229)
The SolarWinds Platform was susceptible to the Incorrect Comparison Vulnerability. This vulnerability allows users with administrative access to SolarWinds Web Console to execute arbitrary commands with SYSTEM privileges. (CVE-2023-23844, CVE-2023-33225)
The SolarWinds Platform was susceptible to the Incorrect Comparison Vulnerability. This vulnerability allows users with administrative access to SolarWinds Web Console to execute arbitrary commands.
(CVE-2023-23843)
Note that Nessus has not tested for these issues but has instead relied only on the application’s self-reported version number.
#%NASL_MIN_LEVEL 80900
##
# (C) Tenable, Inc.
##
include('compat.inc');
if (description)
{
script_id(178950);
script_version("1.7");
script_set_attribute(attribute:"plugin_modification_date", value:"2023/12/01");
script_cve_id(
"CVE-2023-3622",
"CVE-2023-23843",
"CVE-2023-23844",
"CVE-2023-33224",
"CVE-2023-33225",
"CVE-2023-33229"
);
script_xref(name:"IAVA", value:"2023-A-0385");
script_xref(name:"IAVA", value:"2023-A-0490-S");
script_name(english:"SolarWinds Platform 2023.2.0 < 2023.3 Multiple Vulnerabilities");
script_set_attribute(attribute:"synopsis", value:
"");
script_set_attribute(attribute:"description", value:
"The version of SolarWinds Platform installed on the remote host is prior to 2023.3. It is, therefore, affected by
multiple vulnerabilities as referenced in the solarwinds_platform_2023_3 advisory.
- Access Control Bypass Vulnerability in the SolarWinds Platform that allows an underprivileged user to read
arbitrary resource (CVE-2023-3622)
- The SolarWinds Platform was susceptible to the Incorrect Behavior Order Vulnerability. This vulnerability
allows users with administrative access to SolarWinds Web Console to execute arbitrary commands with
NETWORK SERVICE privileges. (CVE-2023-33224)
- The SolarWinds Platform was susceptible to the Incorrect Input Neutralization Vulnerability. This
vulnerability allows a remote adversary with a valid SolarWinds Platform account to append URL parameters
to inject passive HTML. (CVE-2023-33229)
- The SolarWinds Platform was susceptible to the Incorrect Comparison Vulnerability. This vulnerability
allows users with administrative access to SolarWinds Web Console to execute arbitrary commands with
SYSTEM privileges. (CVE-2023-23844, CVE-2023-33225)
- The SolarWinds Platform was susceptible to the Incorrect Comparison Vulnerability. This vulnerability
allows users with administrative access to SolarWinds Web Console to execute arbitrary commands.
(CVE-2023-23843)
Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version
number.");
# https://www.solarwinds.com/trust-center/security-advisories/cve-2023-3622
script_set_attribute(attribute:"see_also", value:"http://www.nessus.org/u?905e3abb");
# https://www.solarwinds.com/trust-center/security-advisories/cve-2023-33224
script_set_attribute(attribute:"see_also", value:"http://www.nessus.org/u?60112595");
# https://www.solarwinds.com/trust-center/security-advisories/cve-2023-33229
script_set_attribute(attribute:"see_also", value:"http://www.nessus.org/u?3c0f37c3");
# https://www.solarwinds.com/trust-center/security-advisories/cve-2023-33225
script_set_attribute(attribute:"see_also", value:"http://www.nessus.org/u?887dec10");
# https://www.solarwinds.com/trust-center/security-advisories/cve-2023-23844
script_set_attribute(attribute:"see_also", value:"http://www.nessus.org/u?4ff5a141");
# https://www.solarwinds.com/trust-center/security-advisories/cve-2023-23843
script_set_attribute(attribute:"see_also", value:"http://www.nessus.org/u?4caedf5d");
script_set_attribute(attribute:"solution", value:
"Upgrade to SolarWinds Platform version 2023.3 or later.");
script_set_attribute(attribute:"agent", value:"windows");
script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:M/C:C/I:C/A:C");
script_set_cvss_temporal_vector("CVSS2#E:U/RL:OF/RC:C");
script_set_cvss3_base_vector("CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H");
script_set_cvss3_temporal_vector("CVSS:3.0/E:U/RL:O/RC:C");
script_set_attribute(attribute:"cvss_score_source", value:"CVE-2023-33225");
script_set_attribute(attribute:"exploitability_ease", value:"No known exploits are available");
script_set_attribute(attribute:"exploit_available", value:"false");
script_set_attribute(attribute:"vuln_publication_date", value:"2023/07/18");
script_set_attribute(attribute:"patch_publication_date", value:"2023/07/18");
script_set_attribute(attribute:"plugin_publication_date", value:"2023/07/27");
script_set_attribute(attribute:"plugin_type", value:"combined");
script_set_attribute(attribute:"cpe", value:"cpe:/a:solarwinds:orion_platform");
script_set_attribute(attribute:"generated_plugin", value:"former");
script_set_attribute(attribute:"stig_severity", value:"I");
script_end_attributes();
script_category(ACT_GATHER_INFO);
script_family(english:"CGI abuses");
script_copyright(english:"This script is Copyright (C) 2023 and is owned by Tenable, Inc. or an Affiliate thereof.");
script_dependencies("solarwinds_orion_npm_detect.nasl", "solarwinds_orion_installed.nbin");
script_require_keys("installed_sw/SolarWinds Orion Core");
exit(0);
}
include('vcf.inc');
include('vcf_extras.inc');
vcf::solarwinds_orion::initialize();
var app_info = vcf::solarwinds_orion::combined_get_app_info();
var constraints = [
{ 'min_version' : '2023.2.0', 'max_version': '2023.2.1.99999', 'fixed_version' : '2023.3' }
];
vcf::check_version_and_report(app_info:app_info, constraints:constraints, severity:SECURITY_HOLE);
Vendor | Product | Version | CPE |
---|---|---|---|
solarwinds | orion_platform | cpe:/a:solarwinds:orion_platform |
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-23843
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-23844
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-33224
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-33225
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-33229
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3622
www.nessus.org/u?3c0f37c3
www.nessus.org/u?4caedf5d
www.nessus.org/u?4ff5a141
www.nessus.org/u?60112595
www.nessus.org/u?887dec10
www.nessus.org/u?905e3abb
7.2 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
HIGH
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
6.5 Medium
AI Score
Confidence
High
0.001 Low
EPSS
Percentile
48.3%