SolarWinds Storage Manager < 5.7.2 Remote Code Execution

This script is Copyright (C) 2014-2017 Tenable Network Security, Inc.


Synopsis :

The remote host is running a web application affected by a remote code
execution vulnerability.

Description :

The remote host is running a version of SolarWinds Storage Manager
prior to 5.7.2. It is, therefore, affected by a remote code execution
vulnerability due to a flaw in the 'AuthenticationFilter' class. A
remote, unauthenticated attacker can exploit this vulnerability to
upload malicious scripts which can then execute arbitrary code as the
user 'SYSTEM'.

See also :

http://www.zerodayinitiative.com/advisories/ZDI-14-299/

Solution :

Upgrade to SolarWinds Storage Manager version 5.7.2 or later.

Risk factor :

Critical / CVSS Base Score : 10.0
(CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVSS Temporal Score : 8.7
(CVSS2#E:ND/RL:OF/RC:C)
Public Exploit Available : true

Family: Windows

Nessus Plugin ID: 77504 ()

Bugtraq ID: 69438

CVE ID:

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now