SolarWinds Storage Resource Monitor Profiler addNewRule SQL Injection RCE

critical Nessus Plugin ID 92559

Synopsis

A web application running on the remote host is affected by a remote code execution vulnerability.

Description

The SolarWinds Storage Resource Monitor (SRM) Profiler (formerly SolarWinds Storage Manager) running on the remote host is affected by a remote code execution vulnerability in ScriptServlet due to a failure to sanitize user-supplied input to the addNewRule() method of the RulesMetaData class. An unauthenticated, remote attacker can exploit this, via SQL injection, to disclose or manipulate arbitrary data in the back-end database or to execute arbitrary code in the context of the database.

Note that the attacker, in order to exploit this vulnerability, would need to exploit a path traversal vulnerability to invoke the ScriptServlet servlet. This path traversal vulnerability was first fixed in version 6.2.3.

Solution

Upgrade to SolarWinds SRM Profiler version 6.2.3 Hotfix 1 or later.

See Also

http://www.nessus.org/u?799b97fc

https://www.zerodayinitiative.com/advisories/ZDI-16-374/

http://www.nessus.org/u?edc00ceb

Plugin Details

Severity: Critical

ID: 92559

File Name: solarwinds_srm_profiler_zdi-16-374.nasl

Version: 1.7

Type: remote

Family: Web Servers

Published: 7/26/2016

Updated: 6/5/2024

Supported Sensors: Nessus

Enable CGI Scanning: true

Vulnerability Information

CPE: cpe:/a:solarwinds:storage_resource_monitor, cpe:/a:solarwinds:storage_manager

Required KB Items: www/solarwinds_storage_manager

Excluded KB Items: Settings/disable_cgi_scanning

Patch Publication Date: 6/10/2016

Vulnerability Publication Date: 6/10/2016

Reference Information

BID: 91369