This vulnerability allows remote attackers to execute arbitrary code on affected installations of SolarWinds Patch Manager. Authentication is required to exploit this vulnerability. The specific flaw exists within the EditResourceControls endpoint. The issue results from the lack of proper validation of user-supplied data, which can result in deserialization of untrusted data. An attacker can leverage this vulnerability to execute code in the context of NETWORK SERVICE.
Affected Software | Affected Version | How to fix |
---|---|---|
SolarWinds |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of ZDI-21-1246 is considered high due to the potential for remote code execution by an authenticated attacker.
To fix ZDI-21-1246, apply the latest security patch or update provided by SolarWinds for Patch Manager.
ZDI-21-1246 affects all installations of SolarWinds Patch Manager that are not updated to the latest security release.
Yes, authentication is required to exploit ZDI-21-1246.
ZDI-21-1246 is a remote code execution vulnerability that exists due to improper handling of requests in the EditResourceControls endpoint.