3 results (0.007 seconds)

CVSS: 8.9EPSS: 4%CPEs: 1EXPL: 0

Insecure Deseralization of untrusted data remote code execution vulnerability was discovered in Patch Manager Orion Platform Integration module and reported to us by ZDI. An Authenticated Attacker could exploit it by executing WSAsyncExecuteTasks deserialization of untrusted data. Se ha detectado una vulnerabilidad de ejecución de código remota en una Deserialización de datos no confiables en el módulo de integración de la plataforma Orion de Patch Manager y nos fue reportada por ZDI. Un atacante autenticado podría explotarla al ejecutar la deserialización de datos no confiables de WSAsyncExecuteTasks This vulnerability allows remote attackers to execute arbitrary code on affected installations of SolarWinds Patch Manager. Authentication is required to exploit this vulnerability. The specific flaw exists within the WSAsyncExecuteTasks endpoint. • https://documentation.solarwinds.com/en/success_center/orionplatform/content/core-secure-configuration.htm https://documentation.solarwinds.com/en/success_center/orionplatform/content/release_notes/orion_platform_2020-2-6_release_notes.htm https://www.solarwinds.com/trust-center/security-advisories/cve-2021-35217 https://www.zerodayinitiative.com/advisories/ZDI-21-1247 • CWE-502: Deserialization of Untrusted Data •

CVSS: 9.0EPSS: 7%CPEs: 1EXPL: 0

Insecure Deserialization of untrusted data remote code execution vulnerability was discovered in Patch Manager Orion Platform Integration module. An Authenticated Attacker with network access via HTTP can compromise this vulnerability can result in Remote Code Execution. Se ha detectado una vulnerabilidad de ejecución de código remota en una deserialización insegura de datos no confiables en Patch Manager Orion Platform Integration module. Un atacante autenticado con acceso a la red por medio de HTTP puede comprometer esta vulnerabilidad y dar lugar a una ejecución de código remota This vulnerability allows remote attackers to execute arbitrary code on affected installations of SolarWinds Patch Manager. Authentication is required to exploit this vulnerability. The specific flaw exists within the EditResourceControls endpoint. • https://documentation.solarwinds.com/en/success_center/patchman/content/release_notes/patchman_2020-2-6_release_notes.htm https://www.solarwinds.com/trust-center/security-advisories/cve-2021-35216 https://www.zerodayinitiative.com/advisories/ZDI-21-1246 • CWE-502: Deserialization of Untrusted Data •

CVSS: 7.8EPSS: 0%CPEs: 1EXPL: 0

This vulnerability allows local attackers to escalate privileges on affected installations of SolarWinds Patch Manager 2020.2.1. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. The specific flaw exists within the DataGridService WCF service. The issue results from the lack of proper validation of user-supplied data, which can result in deserialization of untrusted data. An attacker can leverage this vulnerability to escalate privileges and execute arbitrary code in the context of Administrator. • https://www.zerodayinitiative.com/advisories/ZDI-21-207 • CWE-502: Deserialization of Untrusted Data •