First published: Wed Feb 10 2021(Updated: )
This vulnerability allows remote attackers to create arbitrary files on affected installations of SolarWinds Orion Platform 2020.2.1. Although authentication is required to exploit this vulnerability, the existing authentication mechanism can be bypassed. The specific flaw exists within VulnerabilitySettings.aspx. The issue results from the lack of proper validation of a user-supplied path prior to using it in file operations. An attacker can leverage this vulnerability to execute arbitrary code in the context of SYSTEM. Was ZDI-CAN-11902.
Credit: zdi-disclosures@trendmicro.com
Affected Software | Affected Version | How to fix |
---|---|---|
SolarWinds Orion Platform | ||
SolarWinds Orion Platform | =2020.2.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID is CVE-2020-27871.
The severity of CVE-2020-27871 is critical with a severity value of 7.2.
SolarWinds Orion Platform 2020.2.1 is affected by CVE-2020-27871.
CVE-2020-27871 allows remote attackers to create arbitrary files on affected installations of SolarWinds Orion Platform 2020.2.1 by bypassing the existing authentication mechanism and exploiting a directory traversal vulnerability.
It is recommended to apply the latest security patch or upgrade to a non-vulnerable version of SolarWinds Orion Platform.