This vulnerability allows remote attackers to escalate privileges on affected installations of SolarWinds Network Performance Monitor. Authentication is required to exploit this vulnerability. The specific flaw exists within the Email class. A crafted request can trigger execution of SQL queries composed from a user-supplied string. An attacker can leverage this vulnerability to escalate privileges to the level of an administrator.
Affected Software | Affected Version | How to fix |
---|---|---|
SolarWinds Orion Network Performance Monitor |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of ZDI-CAN-15317 is high due to its potential to allow privilege escalation on affected installations.
To fix ZDI-CAN-15317, apply the latest security patch provided by SolarWinds for the Network Performance Monitor.
Organizations using SolarWinds Network Performance Monitor with vulnerable configurations may be affected by ZDI-CAN-15317.
Attackers can escalate privileges on affected installations of SolarWinds Network Performance Monitor by exploiting ZDI-CAN-15317.
Yes, authentication is required to exploit ZDI-CAN-15317.