Solarwinds Storage Manager ProcessFileUpload.jsp File Upload Remote Code Execution Vulnerability

ID ZDI-15-460
Type zdi
Reporter Matt Molinyawe - HP Zero Day Initiative
Modified 2015-11-09T00:00:00


This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Solarwinds Storage Manager. Authentication is not required to exploit this vulnerability.

The specific flaw exists within ProcessFileUpload.jsp within the handling of file uploads. The issue lies in the failure to sanitize the files uploaded, allowing them to be placed within directories accessible through the service. An attacker can leverage this vulnerability to execute code as SYSTEM.