漏洞描述
The SolarWinds Security Event Manager was susceptible to Remote Code Execution Vulnerability. This vulnerability allows an unauthenticated user to abuse SolarWinds’ service, resulting in remote code execution.
id: CVE-2024-0692
info:
name: SolarWinds Security Event Manager - Unauthenticated RCE
author: DhiyaneshDK
severity: high
description: |
The SolarWinds Security Event Manager was susceptible to Remote Code Execution Vulnerability. This vulnerability allows an unauthenticated user to abuse SolarWinds’ service, resulting in remote code execution.
impact: |
Unauthenticated attackers on the adjacent network can execute arbitrary code remotely on the SolarWinds Security Event Manager, leading to complete system compromise and potential access to all security event data.
remediation: |
Upgrade to SolarWinds Security Event Manager version 2023.4.1 or later.
reference:
- https://documentation.solarwinds.com/en/success_center/sem/content/release_notes/sem_2023-4-1_release_notes.htm
classification:
cvss-metrics: CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
cvss-score: 8.8
cve-id: CVE-2024-0692
cwe-id: CWE-502
epss-score: 0.83078
epss-percentile: 0.99235
cpe: cpe:2.3:a:solarwinds:security_event_manager:*:*:*:*:*:*:*:*
metadata:
verified: true
max-request: 2
vendor: solarwinds
product: security_event_manager
fofa-query: title="SolarWinds Security Event Manager"
tags: cve,cve2024,solarwinds,event-manager,cisa,vkev,vuln
http:
- raw:
- |
GET /webui/ HTTP/1.1
Host: {{Hostname}}
matchers:
- type: word
part: body
words:
- "SolarWinds Security Event Manager"
internal: true
- raw:
- |
POST /services/messagebroker/streamingamf HTTP/1.1
Host: {{Hostname}}
Content-Type: application/x-amf
abc
matchers:
- type: dsl
dsl:
- 'status_code == 200'
- 'contains(content_type, "application/x-amf")'
- 'contains(body, "AMF version")'
condition: and
# digest: 4a0a0047304502203ae58c353c0de852c05c6baf99a5fe22d54762de399c444e915e990e67a16a60022100ba0a04feeb1af2c9f33ba6ab16055756b4afc6b3ee0e13cc7e565c62e942b37a:922c64590222798bb761d5b6d8e72950