CVE-2024-0692: SolarWinds Security Event Manager - Unauthenticated RCE

日期: 2025-08-01 | 影响软件: SolarWinds Security Event Manager | POC: 已公开

漏洞描述

The SolarWinds Security Event Manager was susceptible to Remote Code Execution Vulnerability. This vulnerability allows an unauthenticated user to abuse SolarWinds’ service, resulting in remote code execution.

PoC代码[已公开]

id: CVE-2024-0692

info:
  name: SolarWinds Security Event Manager - Unauthenticated RCE
  author: DhiyaneshDK
  severity: high
  description: |
    The SolarWinds Security Event Manager was susceptible to Remote Code Execution Vulnerability. This vulnerability allows an unauthenticated user to abuse SolarWinds’ service, resulting in remote code execution.
  impact: |
    Unauthenticated attackers on the adjacent network can execute arbitrary code remotely on the SolarWinds Security Event Manager, leading to complete system compromise and potential access to all security event data.
  remediation: |
    Upgrade to SolarWinds Security Event Manager version 2023.4.1 or later.
  reference:
    - https://documentation.solarwinds.com/en/success_center/sem/content/release_notes/sem_2023-4-1_release_notes.htm
  classification:
    cvss-metrics: CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
    cvss-score: 8.8
    cve-id: CVE-2024-0692
    cwe-id: CWE-502
    epss-score: 0.83078
    epss-percentile: 0.99235
    cpe: cpe:2.3:a:solarwinds:security_event_manager:*:*:*:*:*:*:*:*
  metadata:
    verified: true
    max-request: 2
    vendor: solarwinds
    product: security_event_manager
    fofa-query: title="SolarWinds Security Event Manager"
  tags: cve,cve2024,solarwinds,event-manager,cisa,vkev,vuln

http:
  - raw:
      - |
        GET /webui/ HTTP/1.1
        Host: {{Hostname}}

    matchers:
      - type: word
        part: body
        words:
          - "SolarWinds Security Event Manager"
        internal: true

  - raw:
      - |
        POST /services/messagebroker/streamingamf HTTP/1.1
        Host: {{Hostname}}
        Content-Type: application/x-amf

        abc

    matchers:
      - type: dsl
        dsl:
          - 'status_code == 200'
          - 'contains(content_type, "application/x-amf")'
          - 'contains(body, "AMF version")'
        condition: and
# digest: 4a0a0047304502203ae58c353c0de852c05c6baf99a5fe22d54762de399c444e915e990e67a16a60022100ba0a04feeb1af2c9f33ba6ab16055756b4afc6b3ee0e13cc7e565c62e942b37a:922c64590222798bb761d5b6d8e72950

相关漏洞推荐