Lucene search

K
zdiAnonymousZDI-24-350
HistoryMar 28, 2024 - 12:00 a.m.

SolarWinds Access Rights Manager JsonSerializationHelper Deserialization of Untrusted Data Remote Code Execution Vulnerability

2024-03-2800:00:00
Anonymous
www.zerodayinitiative.com
6
solarwinds
access rights manager
jsonserializationhelper
deserialization
untrusted data
remote code execution
vulnerability
authentication bypass
proper validation
user-supplied data
context of system

7.9 High

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

20.4%

This vulnerability allows remote attackers to execute arbitrary code on affected installations of SolarWinds Access Rights Manager. Although authentication is required to exploit this vulnerability, the existing authentication mechanism can be bypassed. The specific flaw exists within the JsonSerializationHelper class. The issue results from the lack of proper validation of user-supplied data, which can result in deserialization of untrusted data. An attacker can leverage this vulnerability to execute code in the context of SYSTEM.

7.9 High

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

20.4%

Related for ZDI-24-350