This vulnerability allows remote attackers to escalate privileges on affected installations of SolarWinds Network Performance Monitor. Authentication is required to exploit this vulnerability. The specific flaw exists within the TextToSpeech class. A crafted request can trigger execution of SQL queries composed from a user-supplied string. An attacker can leverage this vulnerability to escalate privileges to the level of an application administrator.
Affected Software | Affected Version | How to fix |
---|---|---|
SolarWinds Orion Network Performance Monitor |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
ZDI-CAN-15311 is classified as a high severity vulnerability due to its potential to allow privilege escalation.
To fix ZDI-CAN-15311, it is essential to apply the latest security patches released by SolarWinds for Network Performance Monitor.
Organizations using affected installations of SolarWinds Network Performance Monitor are vulnerable to ZDI-CAN-15311.
Yes, authentication is required to exploit the ZDI-CAN-15311 vulnerability.
ZDI-CAN-15311 enables remote attackers to escalate privileges on compromised systems.