Vulnerabilites related to solarwinds - orion_web_performance_monitor
CVE-2020-14007 (GCVE-0-2020-14007)
Vulnerability from cvelistv5
Published
2020-06-24 13:24
Modified
2024-08-04 12:32
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Solarwinds Orion (with Web Console WPM 2019.4.1, and Orion Platform HF4 or NPM HF2 2019.4) allows XSS via a name of an alert definition.
References
▼ | URL | Tags |
---|---|---|
https://gist.github.com/alert3/f8d33412ab0c671d3cac6a50b132a894 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T12:32:14.642Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://gist.github.com/alert3/f8d33412ab0c671d3cac6a50b132a894" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "Solarwinds Orion (with Web Console WPM 2019.4.1, and Orion Platform HF4 or NPM HF2 2019.4) allows XSS via a name of an alert definition." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2020-06-24T13:24:58", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://gist.github.com/alert3/f8d33412ab0c671d3cac6a50b132a894" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2020-14007", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Solarwinds Orion (with Web Console WPM 2019.4.1, and Orion Platform HF4 or NPM HF2 2019.4) allows XSS via a name of an alert definition." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://gist.github.com/alert3/f8d33412ab0c671d3cac6a50b132a894", "refsource": "MISC", "url": "https://gist.github.com/alert3/f8d33412ab0c671d3cac6a50b132a894" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2020-14007", "datePublished": "2020-06-24T13:24:58", "dateReserved": "2020-06-10T00:00:00", "dateUpdated": "2024-08-04T12:32:14.642Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2020-14006 (GCVE-0-2020-14006)
Vulnerability from cvelistv5
Published
2020-06-24 13:27
Modified
2024-08-04 12:32
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Solarwinds Orion (with Web Console WPM 2019.4.1, and Orion Platform HF4 or NPM HF2 2019.4) allows XSS via a Responsible Team.
References
▼ | URL | Tags |
---|---|---|
https://gist.github.com/alert3/f8d33412ab0c671d3cac6a50b132a894 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T12:32:14.661Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://gist.github.com/alert3/f8d33412ab0c671d3cac6a50b132a894" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "Solarwinds Orion (with Web Console WPM 2019.4.1, and Orion Platform HF4 or NPM HF2 2019.4) allows XSS via a Responsible Team." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2020-06-24T13:27:26", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://gist.github.com/alert3/f8d33412ab0c671d3cac6a50b132a894" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2020-14006", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Solarwinds Orion (with Web Console WPM 2019.4.1, and Orion Platform HF4 or NPM HF2 2019.4) allows XSS via a Responsible Team." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://gist.github.com/alert3/f8d33412ab0c671d3cac6a50b132a894", "refsource": "MISC", "url": "https://gist.github.com/alert3/f8d33412ab0c671d3cac6a50b132a894" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2020-14006", "datePublished": "2020-06-24T13:27:26", "dateReserved": "2020-06-10T00:00:00", "dateUpdated": "2024-08-04T12:32:14.661Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2014-9566 (GCVE-0-2014-9566)
Vulnerability from cvelistv5
Published
2015-03-10 14:00
Modified
2024-08-06 13:47
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Multiple SQL injection vulnerabilities in the Manage Accounts page in the AccountManagement.asmx service in the Solarwinds Orion Platform 2015.1, as used in Network Performance Monitor (NPM) before 11.5, NetFlow Traffic Analyzer (NTA) before 4.1, Network Configuration Manager (NCM) before 7.3.2, IP Address Manager (IPAM) before 4.3, User Device Tracker (UDT) before 3.2, VoIP & Network Quality Manager (VNQM) before 4.2, Server & Application Manager (SAM) before 6.2, Web Performance Monitor (WPM) before 2.2, and possibly other Solarwinds products, allow remote authenticated users to execute arbitrary SQL commands via the (1) dir or (2) sort parameter to the (a) GetAccounts or (b) GetAccountGroups endpoint.
References
▼ | URL | Tags |
---|---|---|
https://github.com/rapid7/metasploit-framework/pull/4836 | x_refsource_MISC | |
http://www.exploit-db.com/exploits/36262 | exploit, x_refsource_EXPLOIT-DB | |
http://osvdb.org/show/osvdb/118746 | vdb-entry, x_refsource_OSVDB | |
http://volatile-minds.blogspot.com/2015/02/authenticated-stacked-sql-injection-in.html | x_refsource_MISC | |
http://seclists.org/fulldisclosure/2015/Mar/18 | mailing-list, x_refsource_FULLDISC | |
http://packetstormsecurity.com/files/130637/Solarwinds-Orion-Service-SQL-Injection.html | x_refsource_MISC | |
http://www.solarwinds.com/documentation/orion/docs/releasenotes/releasenotes.htm | x_refsource_CONFIRM |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T13:47:41.774Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/rapid7/metasploit-framework/pull/4836" }, { "name": "36262", "tags": [ "exploit", "x_refsource_EXPLOIT-DB", "x_transferred" ], "url": "http://www.exploit-db.com/exploits/36262" }, { "name": "118746", "tags": [ "vdb-entry", "x_refsource_OSVDB", "x_transferred" ], "url": "http://osvdb.org/show/osvdb/118746" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://volatile-minds.blogspot.com/2015/02/authenticated-stacked-sql-injection-in.html" }, { "name": "20150303 Multiple SQL injections in core Orion service affecting many Solarwinds products (CVE-2014-9566)", "tags": [ "mailing-list", "x_refsource_FULLDISC", "x_transferred" ], "url": "http://seclists.org/fulldisclosure/2015/Mar/18" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://packetstormsecurity.com/files/130637/Solarwinds-Orion-Service-SQL-Injection.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.solarwinds.com/documentation/orion/docs/releasenotes/releasenotes.htm" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2015-02-24T00:00:00", "descriptions": [ { "lang": "en", "value": "Multiple SQL injection vulnerabilities in the Manage Accounts page in the AccountManagement.asmx service in the Solarwinds Orion Platform 2015.1, as used in Network Performance Monitor (NPM) before 11.5, NetFlow Traffic Analyzer (NTA) before 4.1, Network Configuration Manager (NCM) before 7.3.2, IP Address Manager (IPAM) before 4.3, User Device Tracker (UDT) before 3.2, VoIP \u0026 Network Quality Manager (VNQM) before 4.2, Server \u0026 Application Manager (SAM) before 6.2, Web Performance Monitor (WPM) before 2.2, and possibly other Solarwinds products, allow remote authenticated users to execute arbitrary SQL commands via the (1) dir or (2) sort parameter to the (a) GetAccounts or (b) GetAccountGroups endpoint." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2015-03-10T13:57:00", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/rapid7/metasploit-framework/pull/4836" }, { "name": "36262", "tags": [ "exploit", "x_refsource_EXPLOIT-DB" ], "url": "http://www.exploit-db.com/exploits/36262" }, { "name": "118746", "tags": [ "vdb-entry", "x_refsource_OSVDB" ], "url": "http://osvdb.org/show/osvdb/118746" }, { "tags": [ "x_refsource_MISC" ], "url": "http://volatile-minds.blogspot.com/2015/02/authenticated-stacked-sql-injection-in.html" }, { "name": "20150303 Multiple SQL injections in core Orion service affecting many Solarwinds products (CVE-2014-9566)", "tags": [ "mailing-list", "x_refsource_FULLDISC" ], "url": "http://seclists.org/fulldisclosure/2015/Mar/18" }, { "tags": [ "x_refsource_MISC" ], "url": "http://packetstormsecurity.com/files/130637/Solarwinds-Orion-Service-SQL-Injection.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.solarwinds.com/documentation/orion/docs/releasenotes/releasenotes.htm" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2014-9566", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Multiple SQL injection vulnerabilities in the Manage Accounts page in the AccountManagement.asmx service in the Solarwinds Orion Platform 2015.1, as used in Network Performance Monitor (NPM) before 11.5, NetFlow Traffic Analyzer (NTA) before 4.1, Network Configuration Manager (NCM) before 7.3.2, IP Address Manager (IPAM) before 4.3, User Device Tracker (UDT) before 3.2, VoIP \u0026 Network Quality Manager (VNQM) before 4.2, Server \u0026 Application Manager (SAM) before 6.2, Web Performance Monitor (WPM) before 2.2, and possibly other Solarwinds products, allow remote authenticated users to execute arbitrary SQL commands via the (1) dir or (2) sort parameter to the (a) GetAccounts or (b) GetAccountGroups endpoint." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://github.com/rapid7/metasploit-framework/pull/4836", "refsource": "MISC", "url": "https://github.com/rapid7/metasploit-framework/pull/4836" }, { "name": "36262", "refsource": "EXPLOIT-DB", "url": "http://www.exploit-db.com/exploits/36262" }, { "name": "118746", "refsource": "OSVDB", "url": "http://osvdb.org/show/osvdb/118746" }, { "name": "http://volatile-minds.blogspot.com/2015/02/authenticated-stacked-sql-injection-in.html", "refsource": "MISC", "url": "http://volatile-minds.blogspot.com/2015/02/authenticated-stacked-sql-injection-in.html" }, { "name": "20150303 Multiple SQL injections in core Orion service affecting many Solarwinds products (CVE-2014-9566)", "refsource": "FULLDISC", "url": "http://seclists.org/fulldisclosure/2015/Mar/18" }, { "name": "http://packetstormsecurity.com/files/130637/Solarwinds-Orion-Service-SQL-Injection.html", "refsource": "MISC", "url": "http://packetstormsecurity.com/files/130637/Solarwinds-Orion-Service-SQL-Injection.html" }, { "name": "http://www.solarwinds.com/documentation/orion/docs/releasenotes/releasenotes.htm", "refsource": "CONFIRM", "url": "http://www.solarwinds.com/documentation/orion/docs/releasenotes/releasenotes.htm" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2014-9566", "datePublished": "2015-03-10T14:00:00", "dateReserved": "2015-01-07T00:00:00", "dateUpdated": "2024-08-06T13:47:41.774Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2020-14005 (GCVE-0-2020-14005)
Vulnerability from cvelistv5
Published
2020-06-24 13:28
Modified
2024-08-04 12:32
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Solarwinds Orion (with Web Console WPM 2019.4.1, and Orion Platform HF4 or NPM HF2 2019.4) allows remote attackers to execute arbitrary code via a defined event.
References
▼ | URL | Tags |
---|---|---|
https://gist.github.com/alert3/c9dcce5474e55f408c93c086c30cdbb7 | x_refsource_MISC | |
https://www.zerodayinitiative.com/advisories/ZDI-21-063/ | x_refsource_MISC | |
https://www.zerodayinitiative.com/advisories/ZDI-21-065/ | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T12:32:14.666Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://gist.github.com/alert3/c9dcce5474e55f408c93c086c30cdbb7" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.zerodayinitiative.com/advisories/ZDI-21-063/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.zerodayinitiative.com/advisories/ZDI-21-065/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "Solarwinds Orion (with Web Console WPM 2019.4.1, and Orion Platform HF4 or NPM HF2 2019.4) allows remote attackers to execute arbitrary code via a defined event." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-01-14T18:06:08", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://gist.github.com/alert3/c9dcce5474e55f408c93c086c30cdbb7" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.zerodayinitiative.com/advisories/ZDI-21-063/" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.zerodayinitiative.com/advisories/ZDI-21-065/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2020-14005", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Solarwinds Orion (with Web Console WPM 2019.4.1, and Orion Platform HF4 or NPM HF2 2019.4) allows remote attackers to execute arbitrary code via a defined event." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://gist.github.com/alert3/c9dcce5474e55f408c93c086c30cdbb7", "refsource": "MISC", "url": "https://gist.github.com/alert3/c9dcce5474e55f408c93c086c30cdbb7" }, { "name": "https://www.zerodayinitiative.com/advisories/ZDI-21-063/", "refsource": "MISC", "url": "https://www.zerodayinitiative.com/advisories/ZDI-21-063/" }, { "name": "https://www.zerodayinitiative.com/advisories/ZDI-21-065/", "refsource": "MISC", "url": "https://www.zerodayinitiative.com/advisories/ZDI-21-065/" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2020-14005", "datePublished": "2020-06-24T13:28:21", "dateReserved": "2020-06-10T00:00:00", "dateUpdated": "2024-08-04T12:32:14.666Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
Vulnerability from fkie_nvd
Published
2020-06-24 14:15
Modified
2024-11-21 05:02
Severity ?
Summary
Solarwinds Orion (with Web Console WPM 2019.4.1, and Orion Platform HF4 or NPM HF2 2019.4) allows XSS via a Responsible Team.
References
▼ | URL | Tags | |
---|---|---|---|
cve@mitre.org | https://gist.github.com/alert3/f8d33412ab0c671d3cac6a50b132a894 | Exploit, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://gist.github.com/alert3/f8d33412ab0c671d3cac6a50b132a894 | Exploit, Third Party Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
solarwinds | orion_network_performance_monitor | 2019.4 | |
solarwinds | orion_web_performance_monitor | 2019.4.1 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:solarwinds:orion_network_performance_monitor:2019.4:hotfix2:*:*:*:*:*:*", "matchCriteriaId": "99340AAA-D768-4353-B0E3-3F7FF4F3D56D", "vulnerable": true }, { "criteria": "cpe:2.3:a:solarwinds:orion_web_performance_monitor:2019.4.1:*:*:*:*:*:*:*", "matchCriteriaId": "3E0C92CB-25EC-4875-BD4E-075318EBA46A", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Solarwinds Orion (with Web Console WPM 2019.4.1, and Orion Platform HF4 or NPM HF2 2019.4) allows XSS via a Responsible Team." }, { "lang": "es", "value": "Solarwinds Orion (con Web Console WPM versi\u00f3n 2019.4.1 y Orion Platform HF4 o NPM HF2 versi\u00f3n 2019.4), permite un ataque de tipo XSS por medio de un Equipo Responsable" } ], "id": "CVE-2020-14006", "lastModified": "2024-11-21T05:02:20.197", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 3.5, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:S/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 6.8, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.3, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2020-06-24T14:15:12.100", "references": [ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://gist.github.com/alert3/f8d33412ab0c671d3cac6a50b132a894" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://gist.github.com/alert3/f8d33412ab0c671d3cac6a50b132a894" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-79" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2020-06-24 14:15
Modified
2024-11-21 05:02
Severity ?
Summary
Solarwinds Orion (with Web Console WPM 2019.4.1, and Orion Platform HF4 or NPM HF2 2019.4) allows XSS via a name of an alert definition.
References
▼ | URL | Tags | |
---|---|---|---|
cve@mitre.org | https://gist.github.com/alert3/f8d33412ab0c671d3cac6a50b132a894 | Exploit, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://gist.github.com/alert3/f8d33412ab0c671d3cac6a50b132a894 | Exploit, Third Party Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
solarwinds | orion_network_performance_monitor | 2019.4 | |
solarwinds | orion_web_performance_monitor | 2019.4.1 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:solarwinds:orion_network_performance_monitor:2019.4:hotfix2:*:*:*:*:*:*", "matchCriteriaId": "99340AAA-D768-4353-B0E3-3F7FF4F3D56D", "vulnerable": true }, { "criteria": "cpe:2.3:a:solarwinds:orion_web_performance_monitor:2019.4.1:*:*:*:*:*:*:*", "matchCriteriaId": "3E0C92CB-25EC-4875-BD4E-075318EBA46A", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Solarwinds Orion (with Web Console WPM 2019.4.1, and Orion Platform HF4 or NPM HF2 2019.4) allows XSS via a name of an alert definition." }, { "lang": "es", "value": "Solarwinds Orion (con Web Console WPM versi\u00f3n 2019.4.1 y Orion Platform HF4 o NPM HF2 versi\u00f3n 2019.4), permite un ataque de tipo XSS por medio del nombre de una definici\u00f3n de alerta" } ], "id": "CVE-2020-14007", "lastModified": "2024-11-21T05:02:20.333", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 3.5, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:S/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 6.8, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.3, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2020-06-24T14:15:12.147", "references": [ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://gist.github.com/alert3/f8d33412ab0c671d3cac6a50b132a894" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://gist.github.com/alert3/f8d33412ab0c671d3cac6a50b132a894" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-79" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2020-06-24 14:15
Modified
2024-11-21 05:02
Severity ?
Summary
Solarwinds Orion (with Web Console WPM 2019.4.1, and Orion Platform HF4 or NPM HF2 2019.4) allows remote attackers to execute arbitrary code via a defined event.
References
▼ | URL | Tags | |
---|---|---|---|
cve@mitre.org | https://gist.github.com/alert3/c9dcce5474e55f408c93c086c30cdbb7 | Third Party Advisory | |
cve@mitre.org | https://www.zerodayinitiative.com/advisories/ZDI-21-063/ | Third Party Advisory, VDB Entry | |
cve@mitre.org | https://www.zerodayinitiative.com/advisories/ZDI-21-065/ | Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | https://gist.github.com/alert3/c9dcce5474e55f408c93c086c30cdbb7 | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.zerodayinitiative.com/advisories/ZDI-21-063/ | Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.zerodayinitiative.com/advisories/ZDI-21-065/ | Third Party Advisory, VDB Entry |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
solarwinds | orion_network_performance_monitor | 2019.4 | |
solarwinds | orion_web_performance_monitor | 2019.4.1 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:solarwinds:orion_network_performance_monitor:2019.4:hotfix2:*:*:*:*:*:*", "matchCriteriaId": "99340AAA-D768-4353-B0E3-3F7FF4F3D56D", "vulnerable": true }, { "criteria": "cpe:2.3:a:solarwinds:orion_web_performance_monitor:2019.4.1:*:*:*:*:*:*:*", "matchCriteriaId": "3E0C92CB-25EC-4875-BD4E-075318EBA46A", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Solarwinds Orion (with Web Console WPM 2019.4.1, and Orion Platform HF4 or NPM HF2 2019.4) allows remote attackers to execute arbitrary code via a defined event." }, { "lang": "es", "value": "Solarwinds Orion (con Web Console WPM versi\u00f3n 2019.4.1 y Orion Platform HF4 o NPM HF2 versi\u00f3n 2019.4), permite a atacantes remotos ejecutar c\u00f3digo arbitrario por medio de un evento definido" } ], "id": "CVE-2020-14005", "lastModified": "2024-11-21T05:02:20.037", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "COMPLETE", "baseScore": 9.0, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:L/Au:S/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 8.0, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2020-06-24T14:15:12.037", "references": [ { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://gist.github.com/alert3/c9dcce5474e55f408c93c086c30cdbb7" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "https://www.zerodayinitiative.com/advisories/ZDI-21-063/" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "https://www.zerodayinitiative.com/advisories/ZDI-21-065/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://gist.github.com/alert3/c9dcce5474e55f408c93c086c30cdbb7" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "https://www.zerodayinitiative.com/advisories/ZDI-21-063/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "https://www.zerodayinitiative.com/advisories/ZDI-21-065/" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-noinfo" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2015-03-10 14:59
Modified
2025-04-12 10:46
Severity ?
Summary
Multiple SQL injection vulnerabilities in the Manage Accounts page in the AccountManagement.asmx service in the Solarwinds Orion Platform 2015.1, as used in Network Performance Monitor (NPM) before 11.5, NetFlow Traffic Analyzer (NTA) before 4.1, Network Configuration Manager (NCM) before 7.3.2, IP Address Manager (IPAM) before 4.3, User Device Tracker (UDT) before 3.2, VoIP & Network Quality Manager (VNQM) before 4.2, Server & Application Manager (SAM) before 6.2, Web Performance Monitor (WPM) before 2.2, and possibly other Solarwinds products, allow remote authenticated users to execute arbitrary SQL commands via the (1) dir or (2) sort parameter to the (a) GetAccounts or (b) GetAccountGroups endpoint.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:solarwinds:orion_ip_address_manager:*:*:*:*:*:*:*:*", "matchCriteriaId": "1C3DEE62-044C-467D-9F07-86BD9FEE0EA7", "versionEndIncluding": "4.2", "vulnerable": true }, { "criteria": "cpe:2.3:a:solarwinds:orion_netflow_traffic_analyzer:*:*:*:*:*:*:*:*", "matchCriteriaId": "FB9E894B-C5F6-4BD5-9710-06089FCEB8AB", "versionEndIncluding": "4.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:solarwinds:orion_network_configuration_manager:*:*:*:*:*:*:*:*", "matchCriteriaId": "6EE7A32A-A65A-46C9-A0CB-65102183ABB4", "versionEndIncluding": "7.3.1", "vulnerable": true }, { "criteria": "cpe:2.3:a:solarwinds:orion_network_performance_monitor:*:*:*:*:*:*:*:*", "matchCriteriaId": "499282CD-D87E-4B3C-B35A-CA4FD29A2BDF", "versionEndIncluding": "11.4", "vulnerable": true }, { "criteria": "cpe:2.3:a:solarwinds:orion_server_and_application_manager:*:*:*:*:*:*:*:*", "matchCriteriaId": "B0191A37-B396-43B8-A3C9-9B86DC8A9BA3", "versionEndIncluding": "6.1", "vulnerable": true }, { "criteria": "cpe:2.3:a:solarwinds:orion_user_device_tracker:*:*:*:*:*:*:*:*", "matchCriteriaId": "BAE35982-A2E3-4161-8A51-504596915F48", "versionEndIncluding": "3.1", "vulnerable": true }, { "criteria": "cpe:2.3:a:solarwinds:orion_voip_\\\u0026_network_quality_manager:*:*:*:*:*:*:*:*", "matchCriteriaId": "A51F3EC6-240C-4B28-9AF2-9A6DBF250422", "versionEndIncluding": "4.1", "vulnerable": true }, { "criteria": "cpe:2.3:a:solarwinds:orion_web_performance_monitor:*:*:*:*:*:*:*:*", "matchCriteriaId": "141E5646-D444-458A-B302-6A13E3149EA1", "versionEndIncluding": "2.1", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Multiple SQL injection vulnerabilities in the Manage Accounts page in the AccountManagement.asmx service in the Solarwinds Orion Platform 2015.1, as used in Network Performance Monitor (NPM) before 11.5, NetFlow Traffic Analyzer (NTA) before 4.1, Network Configuration Manager (NCM) before 7.3.2, IP Address Manager (IPAM) before 4.3, User Device Tracker (UDT) before 3.2, VoIP \u0026 Network Quality Manager (VNQM) before 4.2, Server \u0026 Application Manager (SAM) before 6.2, Web Performance Monitor (WPM) before 2.2, and possibly other Solarwinds products, allow remote authenticated users to execute arbitrary SQL commands via the (1) dir or (2) sort parameter to the (a) GetAccounts or (b) GetAccountGroups endpoint." }, { "lang": "es", "value": "M\u00faltiples vulnerabilidades de inyecci\u00f3n SQL en la p\u00e1gina Manage Accounts en el servicio AccountManagement.asmx en Solarwinds Orion Platform 2015.1, utilizado en Network Performance Monitor (NPM) anterior a 11.5, NetFlow Traffic Analyzer (NTA) anterior a 4.1, Network Configuration Manager (NCM) anterior a 7.3.2, IP Address Manager (IPAM) anterior a 4.3, User Device Tracker (UDT) anterior a 3.2, VoIP \u0026 Network Quality Manager (VNQM) anterior a 4.2, Server \u0026 Application Manager (SAM) anterior a 6.2, Web Performance Monitor (WPM) anterior a 2.2, y posiblemente otros productos Solarwinds, permiten a usuarios remotos autenticados ejecutar comandos SQL arbitrarios a trav\u00e9s del par\u00e1metro (1) dir o (2) sort en el endpoint (a) GetAccounts o (b) GetAccountGroups." } ], "id": "CVE-2014-9566", "lastModified": "2025-04-12T10:46:40.837", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2015-03-10T14:59:02.757", "references": [ { "source": "cve@mitre.org", "url": "http://osvdb.org/show/osvdb/118746" }, { "source": "cve@mitre.org", "tags": [ "Exploit" ], "url": "http://packetstormsecurity.com/files/130637/Solarwinds-Orion-Service-SQL-Injection.html" }, { "source": "cve@mitre.org", "tags": [ "Exploit" ], "url": "http://seclists.org/fulldisclosure/2015/Mar/18" }, { "source": "cve@mitre.org", "tags": [ "Exploit" ], "url": "http://volatile-minds.blogspot.com/2015/02/authenticated-stacked-sql-injection-in.html" }, { "source": "cve@mitre.org", "tags": [ "Exploit" ], "url": "http://www.exploit-db.com/exploits/36262" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://www.solarwinds.com/documentation/orion/docs/releasenotes/releasenotes.htm" }, { "source": "cve@mitre.org", "url": "https://github.com/rapid7/metasploit-framework/pull/4836" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://osvdb.org/show/osvdb/118746" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit" ], "url": "http://packetstormsecurity.com/files/130637/Solarwinds-Orion-Service-SQL-Injection.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit" ], "url": "http://seclists.org/fulldisclosure/2015/Mar/18" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit" ], "url": "http://volatile-minds.blogspot.com/2015/02/authenticated-stacked-sql-injection-in.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit" ], "url": "http://www.exploit-db.com/exploits/36262" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.solarwinds.com/documentation/orion/docs/releasenotes/releasenotes.htm" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://github.com/rapid7/metasploit-framework/pull/4836" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-89" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }