All the vulnerabilites related to SolarWinds - Web Help Desk
cve-2021-35243
Vulnerability from cvelistv5
Published
2021-12-23 19:48
Modified
2024-09-16 17:18
Severity ?
EPSS score ?
Summary
The HTTP PUT and DELETE methods were enabled in the Web Help Desk web server (12.7.7 and earlier), allowing users to execute dangerous HTTP requests. The HTTP PUT method is normally used to upload data that is saved on the server with a user-supplied URL. While the DELETE method requests that the origin server removes the association between the target resource and its current functionality. Improper use of these methods may lead to a loss of integrity.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | SolarWinds | Web Help Desk |
Version: 12.7.7 and previous versions 12.7.7 HF1 |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T00:33:51.244Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.solarwinds.com/trust-center/security-advisories/cve-2021-35243" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://support.solarwinds.com/SuccessCenter/s/article/Web-Help-Desk-12-7-7-Hotfix-1-Release-Notes?language=en_US" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Web Help Desk", "vendor": "SolarWinds", "versions": [ { "status": "affected", "version": "12.7.7 and previous versions 12.7.7 HF1" } ] } ], "datePublic": "2021-12-22T00:00:00", "descriptions": [ { "lang": "en", "value": "The HTTP PUT and DELETE methods were enabled in the Web Help Desk web server (12.7.7 and earlier), allowing users to execute dangerous HTTP requests. The HTTP PUT method is normally used to upload data that is saved on the server with a user-supplied URL. While the DELETE method requests that the origin server removes the association between the target resource and its current functionality. Improper use of these methods may lead to a loss of integrity." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-749", "description": "CWE-749 Exposed Dangerous Method or Function", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2021-12-27T18:48:19", "orgId": "49f11609-934d-4621-84e6-e02e032104d6", "shortName": "SolarWinds" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://www.solarwinds.com/trust-center/security-advisories/cve-2021-35243" }, { "tags": [ "x_refsource_MISC" ], "url": "https://support.solarwinds.com/SuccessCenter/s/article/Web-Help-Desk-12-7-7-Hotfix-1-Release-Notes?language=en_US" } ], "solutions": [ { "lang": "en", "value": "Affected customers are advised to upgrade to 12.7.7 Hotfix 1 once it becomes available." } ], "source": { "defect": [ "CVE-2021-35243" ], "discovery": "EXTERNAL" }, "title": "HTTP PUT \u0026 DELETE Methods Enabled", "x_generator": { "engine": "Vulnogram 0.0.9" }, "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@solarwinds.com", "DATE_PUBLIC": "2021-12-22T14:30:00.000Z", "ID": "CVE-2021-35243", "STATE": "PUBLIC", "TITLE": "HTTP PUT \u0026 DELETE Methods Enabled" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Web Help Desk", "version": { "version_data": [ { "version_affected": "=", "version_name": "12.7.7 and previous versions", "version_value": "12.7.7 HF1" } ] } } ] }, "vendor_name": "SolarWinds" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The HTTP PUT and DELETE methods were enabled in the Web Help Desk web server (12.7.7 and earlier), allowing users to execute dangerous HTTP requests. The HTTP PUT method is normally used to upload data that is saved on the server with a user-supplied URL. While the DELETE method requests that the origin server removes the association between the target resource and its current functionality. Improper use of these methods may lead to a loss of integrity." } ] }, "generator": { "engine": "Vulnogram 0.0.9" }, "impact": { "cvss": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-749 Exposed Dangerous Method or Function" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.solarwinds.com/trust-center/security-advisories/cve-2021-35243", "refsource": "MISC", "url": "https://www.solarwinds.com/trust-center/security-advisories/cve-2021-35243" }, { "name": "https://support.solarwinds.com/SuccessCenter/s/article/Web-Help-Desk-12-7-7-Hotfix-1-Release-Notes?language=en_US", "refsource": "MISC", "url": "https://support.solarwinds.com/SuccessCenter/s/article/Web-Help-Desk-12-7-7-Hotfix-1-Release-Notes?language=en_US" } ] }, "solution": [ { "lang": "en", "value": "Affected customers are advised to upgrade to 12.7.7 Hotfix 1 once it becomes available." } ], "source": { "defect": [ "CVE-2021-35243" ], "discovery": "EXTERNAL" } } } }, "cveMetadata": { "assignerOrgId": "49f11609-934d-4621-84e6-e02e032104d6", "assignerShortName": "SolarWinds", "cveId": "CVE-2021-35243", "datePublished": "2021-12-23T19:48:34.603987Z", "dateReserved": "2021-06-22T00:00:00", "dateUpdated": "2024-09-16T17:18:45.942Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-35232
Vulnerability from cvelistv5
Published
2021-12-27 18:48
Modified
2024-09-17 03:44
Severity ?
EPSS score ?
Summary
Hard coded credentials discovered in SolarWinds Web Help Desk product. Through these credentials, the attacker with local access to the Web Help Desk host machine allows to execute arbitrary HQL queries against the database and leverage the vulnerability to steal the password hashes of the users or insert arbitrary data into the database.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | SolarWinds | Web Help Desk |
Version: 12.7.7 and previous versions < 12.7.7 HF 1 |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T00:33:51.242Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.solarwinds.com/trust-center/security-advisories/CVE-2021-35232" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://support.solarwinds.com/SuccessCenter/s/article/Web-Help-Desk-12-7-7-Hotfix-1-Release-Notes?language=en_US" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "Web Help Desk", "vendor": "SolarWinds", "versions": [ { "lessThan": "12.7.7 HF 1", "status": "affected", "version": "12.7.7 and previous versions", "versionType": "custom" } ] } ], "credits": [ { "lang": "en", "type": "finder", "user": "00000000-0000-4000-9000-000000000000", "value": "Shubham Shah" } ], "datePublic": "2021-12-21T16:00:00.000Z", "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "\u003cp\u003eHard coded credentials discovered in SolarWinds Web Help Desk product. Through these credentials, the attacker with local access to the Web Help Desk host machine allows to execute arbitrary HQL queries against the database and leverage the vulnerability to steal the password hashes of the users or insert arbitrary data into the database.\u003c/p\u003e" } ], "value": "Hard coded credentials discovered in SolarWinds Web Help Desk product. Through these credentials, the attacker with local access to the Web Help Desk host machine allows to execute arbitrary HQL queries against the database and leverage the vulnerability to steal the password hashes of the users or insert arbitrary data into the database." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 6.8, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-798", "description": "CWE-798: Exposure of Sensitive Information to an Unauthorized Actor", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-08-03T20:30:17.665Z", "orgId": "49f11609-934d-4621-84e6-e02e032104d6", "shortName": "SolarWinds" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://www.solarwinds.com/trust-center/security-advisories/CVE-2021-35232" }, { "tags": [ "x_refsource_MISC" ], "url": "https://support.solarwinds.com/SuccessCenter/s/article/Web-Help-Desk-12-7-7-Hotfix-1-Release-Notes?language=en_US" } ], "solutions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "\u003cp\u003eSolarWinds advises the customers to upgrade to the latest Web Help Desk 12.7.7 Hotfix 1 product release once it becomes generally available.\u003c/p\u003e" } ], "value": "SolarWinds advises the customers to upgrade to the latest Web Help Desk 12.7.7 Hotfix 1 product release once it becomes generally available." } ], "source": { "defect": [ "CVE-2021-35232" ], "discovery": "EXTERNAL" }, "title": "Hard credentials discovered in SolarWinds Web Help Desk which allows to execute Arbitrary Hibernate Queries", "x_generator": { "engine": "Vulnogram 0.0.9" }, "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@solarwinds.com", "DATE_PUBLIC": "2021-12-22T15:45:00.000Z", "ID": "CVE-2021-35232", "STATE": "PUBLIC", "TITLE": "Hard credentials discovered in SolarWinds Web Help Desk which allows to execute Arbitrary Hibernate Queries" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Web Help Desk", "version": { "version_data": [ { "version_affected": "\u003c", "version_name": "12.7.7 and previous versions", "version_value": "12.7.7 HF 1" } ] } } ] }, "vendor_name": "SolarWinds" } ] } }, "credit": [ { "lang": "eng", "value": "Shubham Shah" } ], "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Hard coded credentials discovered in SolarWinds Web Help Desk product. Through these credentials, the attacker with local access to the Web Help Desk host machine allows to execute arbitrary HQL queries against the database and leverage the vulnerability to steal the password hashes of the users or insert arbitrary data into the database." } ] }, "generator": { "engine": "Vulnogram 0.0.9" }, "impact": { "cvss": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 6.8, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-200: Exposure of Sensitive Information to an Unauthorized Actor" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.solarwinds.com/trust-center/security-advisories/CVE-2021-35232", "refsource": "MISC", "url": "https://www.solarwinds.com/trust-center/security-advisories/CVE-2021-35232" }, { "name": "https://support.solarwinds.com/SuccessCenter/s/article/Web-Help-Desk-12-7-7-Hotfix-1-Release-Notes?language=en_US", "refsource": "MISC", "url": "https://support.solarwinds.com/SuccessCenter/s/article/Web-Help-Desk-12-7-7-Hotfix-1-Release-Notes?language=en_US" } ] }, "solution": [ { "lang": "en", "value": "SolarWinds advises the customers to upgrade to the latest Web Help Desk 12.7.7 Hotfix 1 product release once it becomes generally available." } ], "source": { "defect": [ "CVE-2021-35232" ], "discovery": "EXTERNAL" } } } }, "cveMetadata": { "assignerOrgId": "49f11609-934d-4621-84e6-e02e032104d6", "assignerShortName": "SolarWinds", "cveId": "CVE-2021-35232", "datePublished": "2021-12-27T18:48:18.158328Z", "dateReserved": "2021-06-22T00:00:00", "dateUpdated": "2024-09-17T03:44:02.601Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-28986
Vulnerability from cvelistv5
Published
2024-08-13 22:06
Modified
2024-08-15 17:25
Severity ?
EPSS score ?
Summary
SolarWinds Web Help Desk was found to be susceptible to a Java Deserialization Remote Code Execution vulnerability that, if exploited, would allow an attacker to run commands on the host machine.
While it was reported as an unauthenticated vulnerability, SolarWinds has been unable to reproduce it without authentication after thorough testing.
However, out of an abundance of caution, we recommend all Web Help Desk customers apply the patch, which is now available.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | SolarWinds | Web Help Desk |
Version: previous versions |
|
{ "containers": { "adp": [ { "affected": [ { "cpes": [ "cpe:2.3:a:solarwinds:webhelpdesk:*:*:*:*:*:*:*:*" ], "defaultStatus": "affected", "product": "webhelpdesk", "vendor": "solarwinds", "versions": [ { "lessThanOrEqual": "12.8.3", "status": "affected", "version": "0", "versionType": "custom" } ] } ], "metrics": [ { "other": { "content": { "id": "CVE-2024-28986", "options": [ { "Exploitation": "active" }, { "Automatable": "yes" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-08-15T14:32:53.512984Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-08-15T17:25:03.568Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "affected", "product": "Web Help Desk", "vendor": "SolarWinds", "versions": [ { "lessThanOrEqual": "12.8.3", "status": "affected", "version": "previous versions", "versionType": "12.8.3" } ] } ], "credits": [ { "lang": "en", "type": "finder", "user": "00000000-0000-4000-9000-000000000000", "value": "Inmarsat Government / Viasat" } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "\u003cp\u003eSolarWinds Web Help Desk was found to be susceptible to a Java Deserialization Remote Code Execution vulnerability that, if exploited, would allow an attacker to run commands on the host machine. \u003c/p\u003e\u003cp\u003eWhile it was reported as an \u003cem\u003eunauthenticated\u003c/em\u003e\u0026nbsp;vulnerability, SolarWinds has been \u003cem\u003eunable to reproduce it\u003c/em\u003e\u0026nbsp;\u003cem\u003ewithout authentication\u003c/em\u003e\u0026nbsp;after thorough testing. \u0026nbsp;\u003c/p\u003e\u003cp\u003eHowever, out of an abundance of caution, we recommend all Web Help Desk customers apply the patch, which is now available. \u003c/p\u003e" } ], "value": "SolarWinds Web Help Desk was found to be susceptible to a Java Deserialization Remote Code Execution vulnerability that, if exploited, would allow an attacker to run commands on the host machine. \n\nWhile it was reported as an unauthenticated\u00a0vulnerability, SolarWinds has been unable to reproduce it\u00a0without authentication\u00a0after thorough testing. \u00a0\n\nHowever, out of an abundance of caution, we recommend all Web Help Desk customers apply the patch, which is now available." } ], "impacts": [ { "capecId": "CAPEC-586", "descriptions": [ { "lang": "en", "value": "CAPEC-586 Object Injection" } ] } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-502", "description": "CWE-502 Deserialization of Untrusted Data", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-08-14T16:53:10.914Z", "orgId": "49f11609-934d-4621-84e6-e02e032104d6", "shortName": "SolarWinds" }, "references": [ { "url": "https://www.solarwinds.com/trust-center/security-advisories/CVE-2024-28986" }, { "url": "https://support.solarwinds.com/SuccessCenter/s/article/WHD-12-8-3-Hotfix-1" } ], "solutions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "All SolarWinds Web Help Desk customers are advised to upgrade to the latest version of the SolarWinds Web Help Desk 12.8.3 HF 1\u003cbr\u003e" } ], "value": "All SolarWinds Web Help Desk customers are advised to upgrade to the latest version of the SolarWinds Web Help Desk 12.8.3 HF 1" } ], "source": { "discovery": "UNKNOWN" }, "title": "SolarWinds Web Help Desk Java Deserialization Remote Code Execution Vulnerability", "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "49f11609-934d-4621-84e6-e02e032104d6", "assignerShortName": "SolarWinds", "cveId": "CVE-2024-28986", "datePublished": "2024-08-13T22:06:45.234Z", "dateReserved": "2024-03-13T20:27:09.782Z", "dateUpdated": "2024-08-15T17:25:03.568Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-28987
Vulnerability from cvelistv5
Published
2024-08-21 21:17
Modified
2024-10-16 13:00
Severity ?
EPSS score ?
Summary
The SolarWinds Web Help Desk (WHD) software is affected by a hardcoded credential vulnerability, allowing remote unauthenticated user to access internal functionality and modify data.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | SolarWinds | Web Help Desk |
Version: 12.8.3 Hotfix 1 and previous versions |
|
{ "containers": { "adp": [ { "affected": [ { "cpes": [ "cpe:2.3:a:solarwinds:webhelpdesk:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "webhelpdesk", "vendor": "solarwinds", "versions": [ { "lessThanOrEqual": "12.8.3", "status": "affected", "version": "0", "versionType": "custom" } ] } ], "metrics": [ { "other": { "content": { "id": "CVE-2024-28987", "options": [ { "Exploitation": "active" }, { "Automatable": "yes" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-10-16T12:59:52.543547Z", "version": "2.0.3" }, "type": "ssvc" } }, { "other": { "content": { "dateAdded": "2024-10-15", "reference": "https://www.cisa.gov/sites/default/files/feeds/known_exploited_vulnerabilities.json" }, "type": "kev" } } ], "providerMetadata": { "dateUpdated": "2024-10-16T13:00:04.181Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-24T22:45:30.565Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "url": "https://www.theregister.com/2024/08/22/hardcoded_credentials_bug_solarwinds_whd/" } ], "title": "CVE Program Container", "x_generator": { "engine": "ADPogram 0.0.1" } } ], "cna": { "affected": [ { "defaultStatus": "affected", "product": "Web Help Desk", "vendor": "SolarWinds", "versions": [ { "status": "affected", "version": "12.8.3 Hotfix 1 and previous versions" } ] } ], "credits": [ { "lang": "en", "type": "finder", "user": "00000000-0000-4000-9000-000000000000", "value": "Zach Hanley" } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "The SolarWinds Web Help Desk (WHD) software is affected by a hardcoded credential vulnerability, allowing remote unauthenticated user to access internal functionality and modify data.\u003cbr\u003e\u003cbr\u003e" } ], "value": "The SolarWinds Web Help Desk (WHD) software is affected by a hardcoded credential vulnerability, allowing remote unauthenticated user to access internal functionality and modify data." } ], "impacts": [ { "capecId": "CAPEC-21", "descriptions": [ { "lang": "en", "value": "CAPEC-21 Exploitation of Trusted Credentials" } ] } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 9.1, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-798", "description": "CWE-798 Use of Hard-coded Credentials", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-08-22T11:43:41.569Z", "orgId": "49f11609-934d-4621-84e6-e02e032104d6", "shortName": "SolarWinds" }, "references": [ { "url": "https://www.solarwinds.com/trust-center/security-advisories/cve-2024-28987" }, { "url": "https://support.solarwinds.com/SuccessCenter/s/article/SolarWinds-Web-Help-Desk-12-8-3-Hotfix-2" } ], "solutions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "SolarWinds recommends that customers upgrade to SolarWinds Web Help Desk v12.8.3 HF2 as soon as it becomes available.\u003cbr\u003e" } ], "value": "SolarWinds recommends that customers upgrade to SolarWinds Web Help Desk v12.8.3 HF2 as soon as it becomes available." } ], "source": { "discovery": "EXTERNAL" }, "title": "SolarWinds Web Help Desk Hardcoded Credential Vulnerability", "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "49f11609-934d-4621-84e6-e02e032104d6", "assignerShortName": "SolarWinds", "cveId": "CVE-2024-28987", "datePublished": "2024-08-21T21:17:23.041Z", "dateReserved": "2024-03-13T20:27:09.782Z", "dateUpdated": "2024-10-16T13:00:04.181Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-35251
Vulnerability from cvelistv5
Published
2022-03-09 15:38
Modified
2024-09-16 22:44
Severity ?
EPSS score ?
Summary
Sensitive information could be displayed when a detailed technical error message is posted. This information could disclose environmental details about the Web Help Desk installation.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | SolarWinds | Web Help Desk |
Version: 12.7.7 HF 1 and Previous Versions < 12.7.8 |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T00:33:51.272Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.solarwinds.com/trust-center/security-advisories/CVE-2021-35251" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://documentation.solarwinds.com/en/success_center/whd/content/release_notes/whd_12-7-8_release_notes.htm" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Web Help Desk", "vendor": "SolarWinds", "versions": [ { "lessThan": "12.7.8", "status": "affected", "version": "12.7.7 HF 1 and Previous Versions", "versionType": "custom" } ] } ], "credits": [ { "lang": "en", "value": "SolarWinds would like to thank for Anthony Meluso reporting this vulnerability." } ], "datePublic": "2022-03-07T00:00:00", "descriptions": [ { "lang": "en", "value": "Sensitive information could be displayed when a detailed technical error message is posted. This information could disclose environmental details about the Web Help Desk installation." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-209", "description": "CWE-209 Information Exposure Through an Error Message", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-03-09T15:38:01", "orgId": "49f11609-934d-4621-84e6-e02e032104d6", "shortName": "SolarWinds" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://www.solarwinds.com/trust-center/security-advisories/CVE-2021-35251" }, { "tags": [ "x_refsource_MISC" ], "url": "https://documentation.solarwinds.com/en/success_center/whd/content/release_notes/whd_12-7-8_release_notes.htm" } ], "solutions": [ { "lang": "en", "value": "SolarWinds advises to upgrade to the latest version of Web Help Desk\n(WHD 12.7.8)." } ], "source": { "defect": [ "CVE-2021-35251" ], "discovery": "USER" }, "title": "Sensitive Data Disclosure Vulnerability", "x_generator": { "engine": "Vulnogram 0.0.9" }, "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@solarwinds.com", "DATE_PUBLIC": "2022-03-07T20:53:00.000Z", "ID": "CVE-2021-35251", "STATE": "PUBLIC", "TITLE": "Sensitive Data Disclosure Vulnerability" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Web Help Desk", "version": { "version_data": [ { "version_affected": "\u003c", "version_name": "12.7.7 HF 1 and Previous Versions", "version_value": "12.7.8" } ] } } ] }, "vendor_name": "SolarWinds" } ] } }, "credit": [ { "lang": "eng", "value": "SolarWinds would like to thank for Anthony Meluso reporting this vulnerability." } ], "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Sensitive information could be displayed when a detailed technical error message is posted. This information could disclose environmental details about the Web Help Desk installation." } ] }, "generator": { "engine": "Vulnogram 0.0.9" }, "impact": { "cvss": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-209 Information Exposure Through an Error Message" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.solarwinds.com/trust-center/security-advisories/CVE-2021-35251", "refsource": "MISC", "url": "https://www.solarwinds.com/trust-center/security-advisories/CVE-2021-35251" }, { "name": "https://documentation.solarwinds.com/en/success_center/whd/content/release_notes/whd_12-7-8_release_notes.htm", "refsource": "MISC", "url": "https://documentation.solarwinds.com/en/success_center/whd/content/release_notes/whd_12-7-8_release_notes.htm" } ] }, "solution": [ { "lang": "en", "value": "SolarWinds advises to upgrade to the latest version of Web Help Desk\n(WHD 12.7.8)." } ], "source": { "defect": [ "CVE-2021-35251" ], "discovery": "USER" } } } }, "cveMetadata": { "assignerOrgId": "49f11609-934d-4621-84e6-e02e032104d6", "assignerShortName": "SolarWinds", "cveId": "CVE-2021-35251", "datePublished": "2022-03-09T15:38:01.677926Z", "dateReserved": "2021-06-22T00:00:00", "dateUpdated": "2024-09-16T22:44:56.753Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-45709
Vulnerability from cvelistv5
Published
2024-12-10 08:20
Modified
2024-12-10 19:53
Severity ?
EPSS score ?
Summary
SolarWinds Web Help Desk was susceptible to a local file read vulnerability. This vulnerability requires the software be installed on Linux and configured to use non-default development/test mode making exposure to the vulnerability very limited.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | SolarWinds | Web Help Desk |
Version: 12.8.3 HF3 and previous versions |
|
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-45709", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-12-10T19:42:33.706276Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-12-10T19:53:27.023Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "affected", "platforms": [ "Linux" ], "product": "Web Help Desk", "vendor": "SolarWinds", "versions": [ { "status": "affected", "version": "12.8.3 HF3 and previous versions" } ] } ], "credits": [ { "lang": "en", "type": "finder", "user": "00000000-0000-4000-9000-000000000000", "value": "Harsh Jaiswal from Project Discovery" } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "SolarWinds Web Help Desk was susceptible to a local file read vulnerability. This vulnerability requires the software be installed on Linux and configured to use non-default development/test mode making exposure to the vulnerability very limited." } ], "value": "SolarWinds Web Help Desk was susceptible to a local file read vulnerability. This vulnerability requires the software be installed on Linux and configured to use non-default development/test mode making exposure to the vulnerability very limited." } ], "impacts": [ { "capecId": "CAPEC-139", "descriptions": [ { "lang": "en", "value": "CAPEC-139 Relative Path Traversal" } ] } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-22", "description": "CWE-22 Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-12-10T08:20:06.921Z", "orgId": "49f11609-934d-4621-84e6-e02e032104d6", "shortName": "SolarWinds" }, "references": [ { "url": "https://www.solarwinds.com/trust-center/security-advisories/CVE-2024-45709" }, { "url": "https://documentation.solarwinds.com/en/success_center/whd/content/release_notes/whd_12-8-4_release_notes.htm" } ], "solutions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003eSolarWinds recommends customers upgrade to \u003c/span\u003e\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003eSolarWinds \u003c/span\u003e\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003eWeb Help Desk\u003c/span\u003e \u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003e12.8.4 \u003c/span\u003e\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003eas soon as it becomes available.\u003c/span\u003e\n\n\u003cbr\u003e" } ], "value": "SolarWinds recommends customers upgrade to SolarWinds Web Help Desk 12.8.4 as soon as it becomes available." } ], "source": { "discovery": "UNKNOWN" }, "title": "SolarWinds Web Help Desk Local File Read Vulnerability", "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "49f11609-934d-4621-84e6-e02e032104d6", "assignerShortName": "SolarWinds", "cveId": "CVE-2024-45709", "datePublished": "2024-12-10T08:20:06.921Z", "dateReserved": "2024-09-05T08:28:03.887Z", "dateUpdated": "2024-12-10T19:53:27.023Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-32076
Vulnerability from cvelistv5
Published
2021-08-26 14:53
Modified
2024-09-17 01:00
Severity ?
EPSS score ?
Summary
Access Restriction Bypass via referrer spoof was discovered in SolarWinds Web Help Desk 12.7.2. An attacker can access the 'Web Help Desk Getting Started Wizard', especially the admin account creation page, from a non-privileged IP address network range or loopback address by intercepting the HTTP request and changing the referrer from the public IP address to the loopback.
References
▼ | URL | Tags |
---|---|---|
https://www.solarwinds.com/trust-center/security-advisories/cve-2021-32076 | x_refsource_MISC |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | SolarWinds | Web Help Desk |
Version: unspecified < |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T23:17:29.330Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.solarwinds.com/trust-center/security-advisories/cve-2021-32076" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Web Help Desk", "vendor": "SolarWinds", "versions": [ { "lessThanOrEqual": "12.7.5", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "credits": [ { "lang": "en", "value": "SolarWinds would like to thank Moaaz Taha for reporting on the issue in a responsible manner." } ], "datePublic": "2021-08-20T00:00:00", "descriptions": [ { "lang": "en", "value": "Access Restriction Bypass via referrer spoof was discovered in SolarWinds Web Help Desk 12.7.2. An attacker can access the \u0027Web Help Desk Getting Started Wizard\u0027, especially the admin account creation page, from a non-privileged IP address network range or loopback address by intercepting the HTTP request and changing the referrer from the public IP address to the loopback." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-290", "description": "CWE-290 Authentication Bypass by Spoofing", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2021-09-02T13:28:36", "orgId": "49f11609-934d-4621-84e6-e02e032104d6", "shortName": "SolarWinds" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://www.solarwinds.com/trust-center/security-advisories/cve-2021-32076" } ], "solutions": [ { "lang": "en", "value": "SolarWinds has released version 12.7.6 and it is suggested to upgrade as soon as possible." } ], "source": { "defect": [ "CVE-2021-32076" ], "discovery": "UNKNOWN" }, "title": "Access Restriction bypass vulnerability via referrer spoof - Business Logic Bypass", "x_generator": { "engine": "Vulnogram 0.0.9" }, "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@solarwinds.com", "DATE_PUBLIC": "2021-08-20T14:12:00.000Z", "ID": "CVE-2021-32076", "STATE": "PUBLIC", "TITLE": "Access Restriction bypass vulnerability via referrer spoof - Business Logic Bypass" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Web Help Desk", "version": { "version_data": [ { "version_affected": "\u003c=", "version_value": "12.7.5" } ] } } ] }, "vendor_name": "SolarWinds" } ] } }, "credit": [ { "lang": "eng", "value": "SolarWinds would like to thank Moaaz Taha for reporting on the issue in a responsible manner." } ], "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Access Restriction Bypass via referrer spoof was discovered in SolarWinds Web Help Desk 12.7.2. An attacker can access the \u0027Web Help Desk Getting Started Wizard\u0027, especially the admin account creation page, from a non-privileged IP address network range or loopback address by intercepting the HTTP request and changing the referrer from the public IP address to the loopback." } ] }, "generator": { "engine": "Vulnogram 0.0.9" }, "impact": { "cvss": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-290 Authentication Bypass by Spoofing" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.solarwinds.com/trust-center/security-advisories/cve-2021-32076", "refsource": "MISC", "url": "https://www.solarwinds.com/trust-center/security-advisories/cve-2021-32076" } ] }, "solution": [ { "lang": "en", "value": "SolarWinds has released version 12.7.6 and it is suggested to upgrade as soon as possible." } ], "source": { "defect": [ "CVE-2021-32076" ], "discovery": "UNKNOWN" } } } }, "cveMetadata": { "assignerOrgId": "49f11609-934d-4621-84e6-e02e032104d6", "assignerShortName": "SolarWinds", "cveId": "CVE-2021-32076", "datePublished": "2021-08-26T14:53:25.774505Z", "dateReserved": "2021-05-06T00:00:00", "dateUpdated": "2024-09-17T01:00:44.305Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }