CVE-2020-27869
SolarWinds Network Performance Monitor WriteToFile SQL Injection Privilege Escalation Vulnerability
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
0Exploited in Wild
-Decision
Descriptions
This vulnerability allows remote attackers to escalate privileges on affected installations of SolarWinds Network Performance Monitor 2020 HF1, NPM: 2020.2. Authentication is required to exploit this vulnerability. The specific flaw exists within the WriteToFile method. The issue results from the lack of proper validation of a user-supplied string before using it to construct SQL queries. An attacker can leverage this vulnerability to escalate privileges and reset the password for the Admin user. Was ZDI-CAN-11804.
Esta vulnerabilidad permite a atacantes remotos escalar privilegios en las instalaciones afectadas de SolarWinds Network Performance Monitor 2020 HF1, NPM: versión 2020.2. Es requerida una autenticación para explotar esta vulnerabilidad. El fallo específico se presenta dentro del método WriteToFile. El problema resulta de una falta de comprobación apropiada de una cadena suministrada por el usuario antes de usarla para construir consultas SQL. Un atacante puede aprovechar esta vulnerabilidad para escalar privilegios y restablecer la contraseña del usuario administrador. Era ZDI-CAN-11804
This vulnerability allows remote attackers to escalate privileges on affected installations of SolarWinds Network Performance Monitor. Authentication is required to exploit this vulnerability.
The specific flaw exists within the WriteToFile method. The issue results from the lack of proper validation of a user-supplied string before using it to construct SQL queries. An attacker can leverage this vulnerability to escalate privileges and reset the password for the Admin user.
CVSS Scores
SSVC
- Decision:-
Timeline
- 2020-10-27 CVE Reserved
- 2021-02-11 CVE Published
- 2024-05-30 EPSS Updated
- 2024-08-04 CVE Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
- CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
CAPEC
References (1)
URL | Tag | Source |
---|---|---|
https://www.zerodayinitiative.com/advisories/ZDI-21-064 | Third Party Advisory |
URL | Date | SRC |
---|
URL | Date | SRC |
---|
URL | Date | SRC |
---|
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Solarwinds Search vendor "Solarwinds" | Network Performance Monitor Search vendor "Solarwinds" for product "Network Performance Monitor" | 2020 Search vendor "Solarwinds" for product "Network Performance Monitor" and version "2020" | hotfix1 |
Affected
| ||||||
Solarwinds Search vendor "Solarwinds" | Network Performance Monitor Search vendor "Solarwinds" for product "Network Performance Monitor" | 2020.2 Search vendor "Solarwinds" for product "Network Performance Monitor" and version "2020.2" | - |
Affected
|