First published: Tue Mar 10 2015(Updated: )
Multiple SQL injection vulnerabilities in the Manage Accounts page in the AccountManagement.asmx service in the Solarwinds Orion Platform 2015.1, as used in Network Performance Monitor (NPM) before 11.5, NetFlow Traffic Analyzer (NTA) before 4.1, Network Configuration Manager (NCM) before 7.3.2, IP Address Manager (IPAM) before 4.3, User Device Tracker (UDT) before 3.2, VoIP & Network Quality Manager (VNQM) before 4.2, Server & Application Manager (SAM) before 6.2, Web Performance Monitor (WPM) before 2.2, and possibly other Solarwinds products, allow remote authenticated users to execute arbitrary SQL commands via the (1) dir or (2) sort parameter to the (a) GetAccounts or (b) GetAccountGroups endpoint.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Solarwinds IP Address Manager | <=4.2 | |
Solarwinds Orion Netflow Traffic Analyzer | <=4.0 | |
Solarwinds Orion Network Configuration Manager | <=7.3.1 | |
SolarWinds Orion | <=11.4 | |
SolarWinds Server and Application Monitor | <=6.1 | |
Solarwinds Orion User Device Tracker | <=3.1 | |
SolarWinds Orion VoIP & Network Quality Manager | <=4.1 | |
SolarWinds Orion Web Performance Monitor | <=2.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2014-9566 is classified as a high severity vulnerability due to its potential for SQL injection attacks.
To remediate CVE-2014-9566, upgrade affected SolarWinds Orion components to the latest versions provided by SolarWinds.
CVE-2014-9566 affects multiple SolarWinds Orion products including Network Performance Monitor, NetFlow Traffic Analyzer, and Network Configuration Manager.
Exploiting CVE-2014-9566 can allow attackers to perform unauthorized SQL queries on the vulnerable application.
There are no documented workarounds for CVE-2014-9566 other than applying the necessary software updates.