First published: Wed Sep 01 2021(Updated: )
Deserialization of Untrusted Data in the Web Console Chart Endpoint can lead to remote code execution. An unauthorized attacker who has network access to the Orion Patch Manager Web Console could potentially exploit this and compromise the server
Credit: psirt@solarwinds.com
Affected Software | Affected Version | How to fix |
---|---|---|
SolarWinds Orion Platform | <2020.2.6 | |
This issue is fixed in the release of the Patch Manager module for Orion Platform version 2020.2.6.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-35218 is a vulnerability that allows remote attackers to execute arbitrary code on affected installations of SolarWinds Patch Manager.
CVE-2021-35218 can be exploited by bypassing the existing authentication mechanism and exploiting a flaw in the Chart endpoint of SolarWinds Patch Manager to execute arbitrary code.
CVE-2021-35218 has a severity rating of 8.8 (High).
CVE-2021-35218 affects installations of SolarWinds Patch Manager up to version 2020.2.6, as well as SolarWinds Orion Platform.
To mitigate CVE-2021-35218, it is recommended to apply the necessary patches provided by SolarWinds and follow the security advisories.