SolarWinds Storage Resource Monitor Profiler addNewRule SQL Injection RCE

Critical Nessus Plugin ID 92559


A web application running on the remote host is affected by a remote code execution vulnerability.


The SolarWinds Storage Resource Monitor (SRM) Profiler (formerly SolarWinds Storage Manager) running on the remote host is affected by a remote code execution vulnerability in ScriptServlet due to a failure to sanitize user-supplied input to the addNewRule() method of the RulesMetaData class. An unauthenticated, remote attacker can exploit this, via SQL injection, to disclose or manipulate arbitrary data in the back-end database or to execute arbitrary code in the context of the database.

Note that the attacker, in order to exploit this vulnerability, would need to exploit a path traversal vulnerability to invoke the ScriptServlet servlet. This path traversal vulnerability was first fixed in version 6.2.3.


Upgrade to SolarWinds SRM Profiler version 6.2.3 Hotfix 1 or later.

See Also

Plugin Details

Severity: Critical

ID: 92559

File Name: solarwinds_srm_profiler_zdi-16-374.nasl

Version: 1.3

Type: remote

Family: Web Servers

Published: 2016/07/26

Modified: 2018/03/09

Dependencies: 59115

Risk Information

Risk Factor: Critical


Base Score: 10

Temporal Score: 8.3

Vector: CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C

Temporal Vector: CVSS2#E:F/RL:OF/RC:ND

Vulnerability Information

CPE: cpe:/a:solarwinds:storage_manager, cpe:/a:solarwinds:storage_resource_monitor

Required KB Items: www/solarwinds_storage_manager

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 2016/06/10

Vulnerability Publication Date: 2016/06/10

Reference Information

BID: 91369

OSVDB: 140424

ZDI: ZDI-16-374