Advisory Details

October 7th, 2015

Solarwinds Storage Manager ProcessFileUpload.jsp File Upload Remote Code Execution Vulnerability

ZDI-15-460
ZDI-CAN-2731

CVE ID CVE-2015-7838
CVSS SCORE 10.0, AV:N/AC:L/Au:N/C:C/I:C/A:C
AFFECTED VENDORS SolarWinds
AFFECTED PRODUCTS Storage Manager
TREND MICRO CUSTOMER PROTECTION Trend Micro TippingPoint IPS customers are protected against this vulnerability by Digital Vaccine protection filter ID ['19492']. For further product information on the TippingPoint IPS: http://www.tippingpoint.com
VULNERABILITY DETAILS


This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Solarwinds Storage Manager. Authentication is not required to exploit this vulnerability.

The specific flaw exists within ProcessFileUpload.jsp within the handling of file uploads. The issue lies in the failure to sanitize the files uploaded, allowing them to be placed within directories accessible through the service. An attacker can leverage this vulnerability to execute code as SYSTEM.

ADDITIONAL DETAILS SolarWinds has issued an update to correct this vulnerability. More details can be found at:
http://www.solarwinds.com/documentation/srm/docs/releasenotes/releasenotes.htm
DISCLOSURE TIMELINE
  • 2015-02-04 - Vulnerability reported to vendor
  • 2015-10-07 - Coordinated public release of advisory
CREDIT Matt Molinyawe - HP Zero Day Initiative
BACK TO ADVISORIES