First published: Wed Oct 27 2021(Updated: )
The ASP.NET debug feature is enabled by default in Kiwi Syslog Server 9.7.2 and previous versions. ASP.NET allows remote debugging of web applications, if configured to do so. Debug mode causes ASP.NET to compile applications with extra information. The information enables a debugger to closely monitor and control the execution of an application. If an attacker could successfully start a remote debugging session, this is likely to disclose sensitive information about the web application and supporting infrastructure that may be valuable in targeting SWI with malicious intent.
Credit: psirt@solarwinds.com
Affected Software | Affected Version | How to fix |
---|---|---|
Solarwinds Kiwi Syslog Server | <=9.7.2 |
SolarWinds advises Kiwi Syslog Server customers to upgrade to the latest version (9.8) once it becomes generally available.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-35235 is a vulnerability in Kiwi Syslog Server 9.7.2 and previous versions where the ASP.NET debug feature is enabled by default, allowing remote debugging of web applications.
CVE-2021-35235 affects Kiwi Syslog Server 9.7.2 and previous versions by enabling the ASP.NET debug feature by default, which can allow unauthorized access to debug web applications remotely.
CVE-2021-35235 has a severity keyword of 'medium' and a severity value of 5.3 out of 10.
The Common Weakness Enumeration (CWE) for CVE-2021-35235 is CWE-11, which relates to software configuration issues.
To fix CVE-2021-35235 in Kiwi Syslog Server, you should disable the ASP.NET debug feature by following the recommended steps provided by the vendor.