ID ZDI-15-275 Type zdi Reporter Andrea Micalizzi (rgod) Modified 2015-11-09T00:00:00
Description
This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of SolarWinds Storage Manager. Authentication is not required to exploit this vulnerability.
The specific flaw exists within the AuthenticationFilter class. The issue lies in the ability to subvert the authentication filter. An attacker can leverage this vulnerability to upload malicious scripts that can then be used to execute code under the context of SYSTEM.
{"title": "(0Day) SolarWinds Storage Manager AuthenticationFilter Remote Code Execution Vulnerability", "viewCount": 0, "modified": "2015-11-09T00:00:00", "objectVersion": "1.2", "type": "zdi", "bulletinFamily": "info", "href": "http://www.zerodayinitiative.com/advisories/ZDI-15-275", "history": [{"differentElements": ["modified"], "lastseen": "2016-09-04T11:34:09", "bulletin": {"viewCount": 0, "title": "(0Day) SolarWinds Storage Manager AuthenticationFilter Remote Code Execution Vulnerability", "href": "http://www.zerodayinitiative.com/advisories/ZDI-15-275", "objectVersion": "1.2", "type": "zdi", "cvss": {"score": 10.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}, "modified": "2015-09-04T00:00:00", "history": [], "reporter": "Andrea Micalizzi (rgod)", "references": [], "published": "2015-06-30T00:00:00", "id": "ZDI-15-275", "lastseen": "2016-09-04T11:34:09", "edition": 1, "hashmap": [{"hash": "6657e783ecb8e7b78afaf1253f5e0333", "key": "title"}, {"hash": "adba28bb050c6e4a4da9ffb9e886d904", "key": "cvelist"}, {"hash": "d41d8cd98f00b204e9800998ecf8427e", "key": "references"}, {"hash": "3dd086b59554fe33c1b8f051475b4b31", "key": "type"}, {"hash": "56765472680401499c79732468ba4340", "key": "objectVersion"}, {"hash": "7bf9bc0c5a26e89977f0d29f8718c307", "key": "published"}, {"hash": "caf9b6b99962bf5c2264824231d7a40c", "key": "bulletinFamily"}, {"hash": "2bdabeb49c44761f9565717ab0e38165", "key": "cvss"}, {"hash": "52c800fdb69acdb27021c3ce91fa3dad", "key": "reporter"}, {"hash": "c1f8babecce655f1bd313279ec7e5b41", "key": "href"}, {"hash": "ac8a4617d6e269877898e6d4098c8bf0", "key": "description"}, {"hash": "399367e0138962a3ef7b1142fac65281", "key": "modified"}], "cvelist": ["CVE-2015-5371"], "hash": "73be705dc3fd0ad99df561a18ccd909d1d9662682d25380a769d26103613b0e1", "bulletinFamily": "info", "description": "This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of SolarWinds Storage Manager. Authentication is not required to exploit this vulnerability.\n\nThe specific flaw exists within the AuthenticationFilter class. The issue lies in the ability to subvert the authentication filter. An attacker can leverage this vulnerability to upload malicious scripts that can then be used to execute code under the context of SYSTEM."}, "edition": 1}], "reporter": "Andrea Micalizzi (rgod)", "cvss": {"score": 10.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}, "references": [], "lastseen": "2016-11-09T00:18:08", "cvelist": ["CVE-2015-5371"], "edition": 2, "hashmap": [{"hash": "caf9b6b99962bf5c2264824231d7a40c", "key": "bulletinFamily"}, {"hash": "adba28bb050c6e4a4da9ffb9e886d904", "key": "cvelist"}, {"hash": "2bdabeb49c44761f9565717ab0e38165", "key": "cvss"}, {"hash": "ac8a4617d6e269877898e6d4098c8bf0", "key": "description"}, {"hash": "c1f8babecce655f1bd313279ec7e5b41", "key": "href"}, {"hash": "50c7c1afd5da60ac021006aa5ae02a63", "key": "modified"}, {"hash": "56765472680401499c79732468ba4340", "key": "objectVersion"}, {"hash": "7bf9bc0c5a26e89977f0d29f8718c307", "key": "published"}, {"hash": "d41d8cd98f00b204e9800998ecf8427e", "key": "references"}, {"hash": "52c800fdb69acdb27021c3ce91fa3dad", "key": "reporter"}, {"hash": "6657e783ecb8e7b78afaf1253f5e0333", "key": "title"}, {"hash": "3dd086b59554fe33c1b8f051475b4b31", "key": "type"}], "id": "ZDI-15-275", "hash": "c452a1afde5b8d1e1a7e3c2dd1be433be62fb0352cb29010320542999218508c", "published": "2015-06-30T00:00:00", "description": "This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of SolarWinds Storage Manager. Authentication is not required to exploit this vulnerability.\n\nThe specific flaw exists within the AuthenticationFilter class. The issue lies in the ability to subvert the authentication filter. An attacker can leverage this vulnerability to upload malicious scripts that can then be used to execute code under the context of SYSTEM.", "enchantments": {"vulnersScore": 7.5}}
{"result": {"cve": [{"id": "CVE-2015-5371", "type": "cve", "title": "CVE-2015-5371", "description": "The AuthenticationFilter class in SolarWinds Storage Manager allows remote attackers to upload and execute arbitrary scripts via unspecified vectors.", "published": "2015-07-06T10:59:06", "cvss": {"score": 10.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}, "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2015-5371", "cvelist": ["CVE-2015-5371"], "lastseen": "2017-04-18T15:57:31"}], "nessus": [{"id": "SOLARWINDS_STORAGEMANAGER_AUTHFILTERBYPASS_FILEUPLOAD.NASL", "type": "nessus", "title": "SolarWinds Storage Manager AuthenticationFilter Script Upload RCE", "description": "The version of SolarWinds Storage Manager running on the remote host is affected by a remote code execution vulnerability due to a flaw in the AuthenticationFilter class. An unauthenticated, remote attacker can exploit this to bypass the authentication filter and upload arbitrary scripts, resulting in the execution of arbitrary code under the context of SYSTEM.", "published": "2015-12-22T00:00:00", "cvss": {"score": 10.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}, "href": "https://www.tenable.com/plugins/index.php?view=single&id=87600", "cvelist": ["CVE-2015-5371"], "lastseen": "2017-10-29T13:39:20"}]}}