Lucene search

K
zdiPiotr Bazydlo (@chudypb) of Trend Micro Zero Day InitiativeZDI-24-347
HistoryMar 28, 2024 - 12:00 a.m.

SolarWinds Access Rights Manager JsonSerializationBinder Deserialization of Untrusted Data Remote Code Execution Vulnerability

2024-03-2800:00:00
Piotr Bazydlo (@chudypb) of Trend Micro Zero Day Initiative
www.zerodayinitiative.com
3
vulnerability
remote code execution
solarwinds
jsonserializationbinder
authentication
untrusted data

7.8 High

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

20.4%

This vulnerability allows remote attackers to execute arbitrary code on affected installations of SolarWinds Access Rights Manager. Authentication is required to exploit this vulnerability. The specific flaw exists within the JsonSerializationBinder class. The issue results from the lack of proper validation of user-supplied data, which can result in deserialization of untrusted data. An attacker can leverage this vulnerability to execute code in the context of the service account.

7.8 High

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

20.4%

Related for ZDI-24-347