This vulnerability allows remote attackers to escalate privileges on affected installations of SolarWinds Network Performance Monitor. Authentication is required to exploit this vulnerability. The specific flaw exists within the TextToSpeech class. A crafted request can trigger execution of SQL queries composed from a user-supplied string. An attacker can leverage this vulnerability to escalate privileges to the level of an application administrator.
Affected Software | Affected Version | How to fix |
---|---|---|
SolarWinds Orion Network Performance Monitor |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
ZDI-21-1596 has a high severity rating due to its potential for remote privilege escalation.
To mitigate ZDI-21-1596, update your SolarWinds Network Performance Monitor to the latest version released by the vendor.
ZDI-21-1596 affects installations of SolarWinds Network Performance Monitor that are exposed to an authenticated attacker.
ZDI-21-1596 allows remote attackers to escalate privileges on the affected SolarWinds software installations.
Yes, authentication is required to exploit the vulnerability described in ZDI-21-1596.