SolarWinds Storage Manager < 5.7.2 Remote Code Execution

This script is Copyright (C) 2014-2017 Tenable Network Security, Inc.

Synopsis :

The remote host is running a web application affected by a remote code
execution vulnerability.

Description :

The remote host is running a version of SolarWinds Storage Manager
prior to 5.7.2. It is, therefore, affected by a remote code execution
vulnerability due to a flaw in the 'AuthenticationFilter' class. A
remote, unauthenticated attacker can exploit this vulnerability to
upload malicious scripts which can then execute arbitrary code as the
user 'SYSTEM'.

See also :

Solution :

Upgrade to SolarWinds Storage Manager version 5.7.2 or later.

Risk factor :

Critical / CVSS Base Score : 10.0
CVSS Temporal Score : 8.7
Public Exploit Available : true

Family: Windows

Nessus Plugin ID: 77504 ()

Bugtraq ID: 69438


Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now