Lucene search

K
zdiMatt Molinyawe - HP Zero Day InitiativeZDI-15-460
HistoryOct 07, 2015 - 12:00 a.m.

Solarwinds Storage Manager ProcessFileUpload.jsp File Upload Remote Code Execution Vulnerability

2015-10-0700:00:00
Matt Molinyawe - HP Zero Day Initiative
www.zerodayinitiative.com
18

0.012 Low

EPSS

Percentile

85.2%

This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Solarwinds Storage Manager. Authentication is not required to exploit this vulnerability. The specific flaw exists within ProcessFileUpload.jsp within the handling of file uploads. The issue lies in the failure to sanitize the files uploaded, allowing them to be placed within directories accessible through the service. An attacker can leverage this vulnerability to execute code as SYSTEM.

0.012 Low

EPSS

Percentile

85.2%