This vulnerability allows remote attackers to escalate privileges on affected installations of SolarWinds Network Performance Monitor. Authentication is required to exploit this vulnerability. The specific flaw exists within the SolarWinds.Orion.Core.Actions.dll module. A crafted request can trigger execution of SQL queries composed from a user-supplied string. An attacker can leverage this vulnerability to escalate privileges to the level of an application administrator.
Affected Software | Affected Version | How to fix |
---|---|---|
SolarWinds Orion Network Performance Monitor |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
ZDI-CAN-15314 is rated as a high severity vulnerability due to its potential to allow remote privilege escalation.
To mitigate ZDI-CAN-15314, ensure you update your SolarWinds Network Performance Monitor to the latest version that contains the security patch.
Exploitation of ZDI-CAN-15314 can lead to unauthorized privilege escalation on affected installations.
Yes, authentication is required to exploit ZDI-CAN-15314, making it necessary for attackers to have valid credentials.
The specific flaw in ZDI-CAN-15314 exists within the SolarWinds.Orion.Core.Actions.dll module.