Vulnerabilites related to solarwinds - kiwi_syslog_server
Vulnerability from fkie_nvd
Published
2021-10-27 01:15
Modified
2024-11-21 06:12
Severity ?
5.3 (Medium) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
5.3 (Medium) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
5.3 (Medium) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
Summary
The ASP.NET debug feature is enabled by default in Kiwi Syslog Server 9.7.2 and previous versions. ASP.NET allows remote debugging of web applications, if configured to do so. Debug mode causes ASP.NET to compile applications with extra information. The information enables a debugger to closely monitor and control the execution of an application. If an attacker could successfully start a remote debugging session, this is likely to disclose sensitive information about the web application and supporting infrastructure that may be valuable in targeting SWI with malicious intent.
References
▶ | URL | Tags | |
---|---|---|---|
psirt@solarwinds.com | https://documentation.solarwinds.com/en/success_center/kss/content/release_notes/kss_9-8_release_notes.htm | Release Notes, Vendor Advisory | |
psirt@solarwinds.com | https://www.solarwinds.com/trust-center/security-advisories/CVE-2021-35235 | Release Notes, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://documentation.solarwinds.com/en/success_center/kss/content/release_notes/kss_9-8_release_notes.htm | Release Notes, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.solarwinds.com/trust-center/security-advisories/CVE-2021-35235 | Release Notes, Vendor Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
solarwinds | kiwi_syslog_server | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:solarwinds:kiwi_syslog_server:*:*:*:*:*:*:*:*", "matchCriteriaId": "26A25843-D11B-44FB-8CD7-7FBC99D586E2", "versionEndIncluding": "9.7.2", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "The ASP.NET debug feature is enabled by default in Kiwi Syslog Server 9.7.2 and previous versions. ASP.NET allows remote debugging of web applications, if configured to do so. Debug mode causes ASP.NET to compile applications with extra information. The information enables a debugger to closely monitor and control the execution of an application. If an attacker could successfully start a remote debugging session, this is likely to disclose sensitive information about the web application and supporting infrastructure that may be valuable in targeting SWI with malicious intent." }, { "lang": "es", "value": "La funcionalidad debug de ASP.NET est\u00e1 habilitada por defecto en Kiwi Syslog Server 9.7.2 y versiones anteriores. ASP.NET permite una depuraci\u00f3n remota de aplicaciones web, si es configurada para ello. El modo de depuraci\u00f3n causa que ASP.NET compile las aplicaciones con informaci\u00f3n extra. Esta informaci\u00f3n permite a un depurador supervisar y controlar de cerca la ejecuci\u00f3n de una aplicaci\u00f3n. Si un atacante puede iniciar con \u00e9xito una sesi\u00f3n de depuraci\u00f3n remota, es probable que revele informaci\u00f3n confidencial sobre la aplicaci\u00f3n web y la infraestructura de apoyo que puede ser valiosa para apuntar a SWI con intenciones maliciosas" } ], "id": "CVE-2021-35235", "lastModified": "2024-11-21T06:12:07.253", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 1.4, "source": "psirt@solarwinds.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 1.4, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2021-10-27T01:15:07.463", "references": [ { "source": "psirt@solarwinds.com", "tags": [ "Release Notes", "Vendor Advisory" ], "url": "https://documentation.solarwinds.com/en/success_center/kss/content/release_notes/kss_9-8_release_notes.htm" }, { "source": "psirt@solarwinds.com", "tags": [ "Release Notes", "Vendor Advisory" ], "url": "https://www.solarwinds.com/trust-center/security-advisories/CVE-2021-35235" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Release Notes", "Vendor Advisory" ], "url": "https://documentation.solarwinds.com/en/success_center/kss/content/release_notes/kss_9-8_release_notes.htm" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Release Notes", "Vendor Advisory" ], "url": "https://www.solarwinds.com/trust-center/security-advisories/CVE-2021-35235" } ], "sourceIdentifier": "psirt@solarwinds.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-11" } ], "source": "psirt@solarwinds.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "NVD-CWE-noinfo" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2021-10-27 01:15
Modified
2024-11-21 06:12
Severity ?
5.3 (Medium) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
5.3 (Medium) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
5.3 (Medium) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
Summary
The HTTP TRACK & TRACE methods were enabled in Kiwi Syslog Server 9.7.1 and earlier. These methods are intended for diagnostic purposes only. If enabled, the web server will respond to requests that use these methods by returning exact HTTP request that was received in the response to the client. This may lead to the disclosure of sensitive information such as internal authentication headers appended by reverse proxies.
References
▶ | URL | Tags | |
---|---|---|---|
psirt@solarwinds.com | https://documentation.solarwinds.com/en/success_center/kss/content/release_notes/kss_9-8_release_notes.htm | Release Notes, Vendor Advisory | |
psirt@solarwinds.com | https://www.solarwinds.com/trust-center/security-advisories/CVE-2021-35233 | Release Notes, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://documentation.solarwinds.com/en/success_center/kss/content/release_notes/kss_9-8_release_notes.htm | Release Notes, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.solarwinds.com/trust-center/security-advisories/CVE-2021-35233 | Release Notes, Vendor Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
solarwinds | kiwi_syslog_server | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:solarwinds:kiwi_syslog_server:*:*:*:*:*:*:*:*", "matchCriteriaId": "26A25843-D11B-44FB-8CD7-7FBC99D586E2", "versionEndIncluding": "9.7.2", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "The HTTP TRACK \u0026 TRACE methods were enabled in Kiwi Syslog Server 9.7.1 and earlier. These methods are intended for diagnostic purposes only. If enabled, the web server will respond to requests that use these methods by returning exact HTTP request that was received in the response to the client. This may lead to the disclosure of sensitive information such as internal authentication headers appended by reverse proxies." }, { "lang": "es", "value": "Los m\u00e9todos HTTP TRACK \u0026amp; TRACE estaban habilitados en Kiwi Syslog Server versiones 9.7.1 y anteriores. Estos m\u00e9todos est\u00e1n pensados \u00fanicamente para fines de diagn\u00f3stico. Si est\u00e1n habilitados, el servidor web responder\u00e1 a las peticiones que usen estos m\u00e9todos al devolver la petici\u00f3n HTTP exacta que se recibi\u00f3 en la respuesta al cliente. Esto puede conllevar a una divulgaci\u00f3n de informaci\u00f3n confidencial, como los encabezados de autenticaci\u00f3n internas a\u00f1adidas por los proxies inversos" } ], "id": "CVE-2021-35233", "lastModified": "2024-11-21T06:12:06.953", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 1.4, "source": "psirt@solarwinds.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 1.4, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2021-10-27T01:15:07.403", "references": [ { "source": "psirt@solarwinds.com", "tags": [ "Release Notes", "Vendor Advisory" ], "url": "https://documentation.solarwinds.com/en/success_center/kss/content/release_notes/kss_9-8_release_notes.htm" }, { "source": "psirt@solarwinds.com", "tags": [ "Release Notes", "Vendor Advisory" ], "url": "https://www.solarwinds.com/trust-center/security-advisories/CVE-2021-35233" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Release Notes", "Vendor Advisory" ], "url": "https://documentation.solarwinds.com/en/success_center/kss/content/release_notes/kss_9-8_release_notes.htm" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Release Notes", "Vendor Advisory" ], "url": "https://www.solarwinds.com/trust-center/security-advisories/CVE-2021-35233" } ], "sourceIdentifier": "psirt@solarwinds.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-16" } ], "source": "psirt@solarwinds.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "NVD-CWE-noinfo" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2021-10-29 14:15
Modified
2024-11-21 06:12
Severity ?
5.0 (Medium) - CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L
4.3 (Medium) - CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N
4.3 (Medium) - CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N
Summary
A missing HTTP header (X-Frame-Options) in Kiwi Syslog Server has left customers vulnerable to click jacking. Clickjacking is an attack that occurs when an attacker uses a transparent iframe in a window to trick a user into clicking on an actionable item, such as a button or link, to another server in which they have an identical webpage. The attacker essentially hijacks the user activity intended for the original server and sends them to the other server. This is an attack on both the user and the server.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
solarwinds | kiwi_syslog_server | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:solarwinds:kiwi_syslog_server:*:*:*:*:*:*:*:*", "matchCriteriaId": "26A25843-D11B-44FB-8CD7-7FBC99D586E2", "versionEndIncluding": "9.7.2", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "A missing HTTP header (X-Frame-Options) in Kiwi Syslog Server has left customers vulnerable to click jacking. Clickjacking is an attack that occurs when an attacker uses a transparent iframe in a window to trick a user into clicking on an actionable item, such as a button or link, to another server in which they have an identical webpage. The attacker essentially hijacks the user activity intended for the original server and sends them to the other server. This is an attack on both the user and the server." }, { "lang": "es", "value": "Un encabezado HTTP faltante (X-Frame-Options) en Kiwi Syslog Server ha dejado a clientes vulnerables al clickjacking. El clickjacking es un ataque que se produce cuando un atacante usa un iframe transparente en una ventana para enga\u00f1ar a un usuario para que haga clic en un elemento accionable, como un bot\u00f3n o un enlace, a otro servidor en el que tienen una p\u00e1gina web id\u00e9ntica. El atacante esencialmente secuestra la actividad del usuario destinada al servidor original y la env\u00eda al otro servidor. Esto es un ataque tanto al usuario como al servidor" } ], "id": "CVE-2021-35237", "lastModified": "2024-11-21T06:12:07.543", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 5.0, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L", "version": "3.1" }, "exploitabilityScore": 1.6, "impactScore": 3.4, "source": "psirt@solarwinds.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 1.4, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2021-10-29T14:15:07.607", "references": [ { "source": "psirt@solarwinds.com", "tags": [ "Release Notes", "Vendor Advisory" ], "url": "https://documentation.solarwinds.com/en/success_center/kss/content/release_notes/kss_9-8_release_notes.htm" }, { "source": "psirt@solarwinds.com", "tags": [ "Vendor Advisory" ], "url": "https://www.solarwinds.com/trust-center/security-advisories/cve-2021-35237" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Release Notes", "Vendor Advisory" ], "url": "https://documentation.solarwinds.com/en/success_center/kss/content/release_notes/kss_9-8_release_notes.htm" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.solarwinds.com/trust-center/security-advisories/cve-2021-35237" } ], "sourceIdentifier": "psirt@solarwinds.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-1021" } ], "source": "psirt@solarwinds.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-1021" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2021-10-25 13:15
Modified
2024-11-21 06:12
Severity ?
6.7 (Medium) - CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
6.7 (Medium) - CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
6.7 (Medium) - CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
Summary
As a result of an unquoted service path vulnerability present in the Kiwi Syslog Server Installation Wizard, a local attacker could gain escalated privileges by inserting an executable into the path of the affected service or uninstall entry. Example vulnerable path: "Computer\HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\Kiwi Syslog Server\Parameters\Application".
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
solarwinds | kiwi_syslog_server | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:solarwinds:kiwi_syslog_server:*:*:*:*:*:*:*:*", "matchCriteriaId": "20B34DD1-220E-4311-922F-53D16FCD6200", "versionEndExcluding": "9.8", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "As a result of an unquoted service path vulnerability present in the Kiwi Syslog Server Installation Wizard, a local attacker could gain escalated privileges by inserting an executable into the path of the affected service or uninstall entry. Example vulnerable path: \"Computer\\HKEY_LOCAL_MACHINE\\SYSTEM\\ControlSet001\\Services\\Kiwi Syslog Server\\Parameters\\Application\"." }, { "lang": "es", "value": "Como resultado de una vulnerabilidad de ruta de servicio no citada presente en Kiwi Syslog Server Installation Wizard, un atacante local podr\u00eda alcanzar privilegios escalados al insertar un ejecutable en la ruta del servicio afectado o en la entrada de desinstalaci\u00f3n. Ejemplo de ruta vulnerable: \"Computer\\HKEY_LOCAL_MACHINE\\SYSTEM\\ControlSet001\\Services\\Kiwi Syslog Server\\Parameters\\Application\"" } ], "id": "CVE-2021-35231", "lastModified": "2024-11-21T06:12:06.697", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.6, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 6.7, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 0.8, "impactScore": 5.9, "source": "psirt@solarwinds.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 6.7, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 0.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2021-10-25T13:15:07.893", "references": [ { "source": "psirt@solarwinds.com", "tags": [ "Release Notes", "Vendor Advisory" ], "url": "https://documentation.solarwinds.com/en/success_center/kss/content/release_notes/kss_9-8_release_notes.htm" }, { "source": "psirt@solarwinds.com", "tags": [ "Vendor Advisory" ], "url": "https://www.solarwinds.com/trust-center/security-advisories/cve-2021-35231" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Release Notes", "Vendor Advisory" ], "url": "https://documentation.solarwinds.com/en/success_center/kss/content/release_notes/kss_9-8_release_notes.htm" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.solarwinds.com/trust-center/security-advisories/cve-2021-35231" } ], "sourceIdentifier": "psirt@solarwinds.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-428" } ], "source": "psirt@solarwinds.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-428" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2021-10-27 01:15
Modified
2024-11-21 06:12
Severity ?
3.1 (Low) - CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N
5.3 (Medium) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
5.3 (Medium) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
Summary
The Secure flag is not set in the SSL Cookie of Kiwi Syslog Server 9.7.2 and previous versions. The Secure attribute tells the browser to only send the cookie if the request is being sent over a secure channel such as HTTPS. This will help protect the cookie from being passed over unencrypted requests. If the application can be accessed over both HTTP, there is a potential for the cookie can be sent in clear text.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
solarwinds | kiwi_syslog_server | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:solarwinds:kiwi_syslog_server:*:*:*:*:*:*:*:*", "matchCriteriaId": "26A25843-D11B-44FB-8CD7-7FBC99D586E2", "versionEndIncluding": "9.7.2", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "The Secure flag is not set in the SSL Cookie of Kiwi Syslog Server 9.7.2 and previous versions. The Secure attribute tells the browser to only send the cookie if the request is being sent over a secure channel such as HTTPS. This will help protect the cookie from being passed over unencrypted requests. If the application can be accessed over both HTTP, there is a potential for the cookie can be sent in clear text." }, { "lang": "es", "value": "El indicador de seguridad no est\u00e1 establecido en la cookie SSL de Kiwi Syslog Server 9.7.2 y versiones anteriores. El atributo Secure indica al navegador que s\u00f3lo env\u00ede la cookie si la petici\u00f3n se env\u00eda a trav\u00e9s de un canal seguro como HTTPS. Esto ayudar\u00e1 a proteger la cookie de ser transmitida a trav\u00e9s de peticiones no encriptadas. Si la aplicaci\u00f3n puede ser accedida a trav\u00e9s de ambos HTTP, se presenta la posibilidad de que la cookie pueda ser enviada en texto sin cifrar" } ], "id": "CVE-2021-35236", "lastModified": "2024-11-21T06:12:07.410", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 3.1, "baseSeverity": "LOW", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 1.6, "impactScore": 1.4, "source": "psirt@solarwinds.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 1.4, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2021-10-27T01:15:07.530", "references": [ { "source": "psirt@solarwinds.com", "tags": [ "Release Notes", "Vendor Advisory" ], "url": "https://documentation.solarwinds.com/en/success_center/kss/content/release_notes/kss_9-8_release_notes.htm" }, { "source": "psirt@solarwinds.com", "tags": [ "Vendor Advisory" ], "url": "https://www.solarwinds.com/trust-center/security-advisories/cve-2021-35236" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Release Notes", "Vendor Advisory" ], "url": "https://documentation.solarwinds.com/en/success_center/kss/content/release_notes/kss_9-8_release_notes.htm" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.solarwinds.com/trust-center/security-advisories/cve-2021-35236" } ], "sourceIdentifier": "psirt@solarwinds.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-614" } ], "source": "psirt@solarwinds.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-311" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
CVE-2021-35233 (GCVE-0-2021-35233)
Vulnerability from cvelistv5
Published
2021-10-27 00:51
Modified
2024-09-16 16:33
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-16 - Configuration
Summary
The HTTP TRACK & TRACE methods were enabled in Kiwi Syslog Server 9.7.1 and earlier. These methods are intended for diagnostic purposes only. If enabled, the web server will respond to requests that use these methods by returning exact HTTP request that was received in the response to the client. This may lead to the disclosure of sensitive information such as internal authentication headers appended by reverse proxies.
References
► | URL | Tags |
---|---|---|
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
SolarWinds | Kiwi Syslog Server |
Version: 9.7.2 and previous versions < 9.8 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T00:33:51.334Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://documentation.solarwinds.com/en/success_center/kss/content/release_notes/kss_9-8_release_notes.htm" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.solarwinds.com/trust-center/security-advisories/CVE-2021-35233" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "platforms": [ "Windows" ], "product": "Kiwi Syslog Server", "vendor": "SolarWinds", "versions": [ { "lessThan": "9.8", "status": "affected", "version": "9.7.2 and previous versions", "versionType": "custom" } ] } ], "datePublic": "2021-10-19T00:00:00", "descriptions": [ { "lang": "en", "value": "The HTTP TRACK \u0026 TRACE methods were enabled in Kiwi Syslog Server 9.7.1 and earlier. These methods are intended for diagnostic purposes only. If enabled, the web server will respond to requests that use these methods by returning exact HTTP request that was received in the response to the client. This may lead to the disclosure of sensitive information such as internal authentication headers appended by reverse proxies." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-16", "description": "CWE-16 Configuration", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2021-10-27T00:51:36", "orgId": "49f11609-934d-4621-84e6-e02e032104d6", "shortName": "SolarWinds" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://documentation.solarwinds.com/en/success_center/kss/content/release_notes/kss_9-8_release_notes.htm" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.solarwinds.com/trust-center/security-advisories/CVE-2021-35233" } ], "solutions": [ { "lang": "en", "value": "SolarWinds recommends upgrading to both the latest version of Kiwi Syslog Server 9.8 as soon as it becomes available." } ], "source": { "defect": [ "CVE-2021-35233" ], "discovery": "EXTERNAL" }, "title": "HTTP TRACK \u0026 TRACE Methods Enabled", "x_generator": { "engine": "Vulnogram 0.0.9" }, "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@solarwinds.com", "DATE_PUBLIC": "2021-10-19T12:46:00.000Z", "ID": "CVE-2021-35233", "STATE": "PUBLIC", "TITLE": "HTTP TRACK \u0026 TRACE Methods Enabled" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Kiwi Syslog Server", "version": { "version_data": [ { "platform": "Windows", "version_affected": "\u003c", "version_name": "9.7.2 and previous versions", "version_value": "9.8" } ] } } ] }, "vendor_name": "SolarWinds" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The HTTP TRACK \u0026 TRACE methods were enabled in Kiwi Syslog Server 9.7.1 and earlier. These methods are intended for diagnostic purposes only. If enabled, the web server will respond to requests that use these methods by returning exact HTTP request that was received in the response to the client. This may lead to the disclosure of sensitive information such as internal authentication headers appended by reverse proxies." } ] }, "generator": { "engine": "Vulnogram 0.0.9" }, "impact": { "cvss": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-16 Configuration" } ] } ] }, "references": { "reference_data": [ { "name": "https://documentation.solarwinds.com/en/success_center/kss/content/release_notes/kss_9-8_release_notes.htm", "refsource": "MISC", "url": "https://documentation.solarwinds.com/en/success_center/kss/content/release_notes/kss_9-8_release_notes.htm" }, { "name": "https://www.solarwinds.com/trust-center/security-advisories/CVE-2021-35233", "refsource": "MISC", "url": "https://www.solarwinds.com/trust-center/security-advisories/CVE-2021-35233" } ] }, "solution": [ { "lang": "en", "value": "SolarWinds recommends upgrading to both the latest version of Kiwi Syslog Server 9.8 as soon as it becomes available." } ], "source": { "defect": [ "CVE-2021-35233" ], "discovery": "EXTERNAL" } } } }, "cveMetadata": { "assignerOrgId": "49f11609-934d-4621-84e6-e02e032104d6", "assignerShortName": "SolarWinds", "cveId": "CVE-2021-35233", "datePublished": "2021-10-27T00:51:36.164224Z", "dateReserved": "2021-06-22T00:00:00", "dateUpdated": "2024-09-16T16:33:00.126Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2021-35235 (GCVE-0-2021-35235)
Vulnerability from cvelistv5
Published
2021-10-27 00:55
Modified
2024-09-17 04:19
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-11 - ASP.NET Misconfiguration: Creating Debug Binary
Summary
The ASP.NET debug feature is enabled by default in Kiwi Syslog Server 9.7.2 and previous versions. ASP.NET allows remote debugging of web applications, if configured to do so. Debug mode causes ASP.NET to compile applications with extra information. The information enables a debugger to closely monitor and control the execution of an application. If an attacker could successfully start a remote debugging session, this is likely to disclose sensitive information about the web application and supporting infrastructure that may be valuable in targeting SWI with malicious intent.
References
► | URL | Tags |
---|---|---|
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
SolarWinds | Kiwi Syslog Server |
Version: 9.7.2 and previous versions < 9.8 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T00:33:51.204Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://documentation.solarwinds.com/en/success_center/kss/content/release_notes/kss_9-8_release_notes.htm" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.solarwinds.com/trust-center/security-advisories/CVE-2021-35235" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Kiwi Syslog Server", "vendor": "SolarWinds", "versions": [ { "lessThan": "9.8", "status": "affected", "version": "9.7.2 and previous versions", "versionType": "custom" } ] } ], "datePublic": "2021-10-19T00:00:00", "descriptions": [ { "lang": "en", "value": "The ASP.NET debug feature is enabled by default in Kiwi Syslog Server 9.7.2 and previous versions. ASP.NET allows remote debugging of web applications, if configured to do so. Debug mode causes ASP.NET to compile applications with extra information. The information enables a debugger to closely monitor and control the execution of an application. If an attacker could successfully start a remote debugging session, this is likely to disclose sensitive information about the web application and supporting infrastructure that may be valuable in targeting SWI with malicious intent." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-11", "description": "CWE-11: ASP.NET Misconfiguration: Creating Debug Binary", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2021-10-27T00:55:43", "orgId": "49f11609-934d-4621-84e6-e02e032104d6", "shortName": "SolarWinds" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://documentation.solarwinds.com/en/success_center/kss/content/release_notes/kss_9-8_release_notes.htm" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.solarwinds.com/trust-center/security-advisories/CVE-2021-35235" } ], "solutions": [ { "lang": "en", "value": "SolarWinds advises\u202fKiwi Syslog Server customers to upgrade to the latest version\u202f(9.8) once it\u202fbecomes\u202fgenerally\u202favailable." } ], "source": { "defect": [ "CVE-2021-35235" ], "discovery": "UNKNOWN" }, "title": "ASP.NET Debug Feature Enabled", "x_generator": { "engine": "Vulnogram 0.0.9" }, "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@solarwinds.com", "DATE_PUBLIC": "2021-10-19T12:59:00.000Z", "ID": "CVE-2021-35235", "STATE": "PUBLIC", "TITLE": "ASP.NET Debug Feature Enabled" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Kiwi Syslog Server", "version": { "version_data": [ { "version_affected": "\u003c", "version_name": "9.7.2 and previous versions", "version_value": "9.8" } ] } } ] }, "vendor_name": "SolarWinds" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The ASP.NET debug feature is enabled by default in Kiwi Syslog Server 9.7.2 and previous versions. ASP.NET allows remote debugging of web applications, if configured to do so. Debug mode causes ASP.NET to compile applications with extra information. The information enables a debugger to closely monitor and control the execution of an application. If an attacker could successfully start a remote debugging session, this is likely to disclose sensitive information about the web application and supporting infrastructure that may be valuable in targeting SWI with malicious intent." } ] }, "generator": { "engine": "Vulnogram 0.0.9" }, "impact": { "cvss": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-11: ASP.NET Misconfiguration: Creating Debug Binary" } ] } ] }, "references": { "reference_data": [ { "name": "https://documentation.solarwinds.com/en/success_center/kss/content/release_notes/kss_9-8_release_notes.htm", "refsource": "MISC", "url": "https://documentation.solarwinds.com/en/success_center/kss/content/release_notes/kss_9-8_release_notes.htm" }, { "name": "https://www.solarwinds.com/trust-center/security-advisories/CVE-2021-35235", "refsource": "MISC", "url": "https://www.solarwinds.com/trust-center/security-advisories/CVE-2021-35235" } ] }, "solution": [ { "lang": "en", "value": "SolarWinds advises\u202fKiwi Syslog Server customers to upgrade to the latest version\u202f(9.8) once it\u202fbecomes\u202fgenerally\u202favailable." } ], "source": { "defect": [ "CVE-2021-35235" ], "discovery": "UNKNOWN" } } } }, "cveMetadata": { "assignerOrgId": "49f11609-934d-4621-84e6-e02e032104d6", "assignerShortName": "SolarWinds", "cveId": "CVE-2021-35235", "datePublished": "2021-10-27T00:55:43.038021Z", "dateReserved": "2021-06-22T00:00:00", "dateUpdated": "2024-09-17T04:19:18.102Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2021-35231 (GCVE-0-2021-35231)
Vulnerability from cvelistv5
Published
2021-10-25 13:00
Modified
2024-09-16 18:38
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-428 - Unquoted Search Path or Element
Summary
As a result of an unquoted service path vulnerability present in the Kiwi Syslog Server Installation Wizard, a local attacker could gain escalated privileges by inserting an executable into the path of the affected service or uninstall entry. Example vulnerable path: "Computer\HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\Kiwi Syslog Server\Parameters\Application".
References
► | URL | Tags |
---|---|---|
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
SolarWinds | Kiwi Syslog Server |
Version: 9.7.2 and previous versions < 9.8 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T00:33:51.285Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.solarwinds.com/trust-center/security-advisories/cve-2021-35231" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://documentation.solarwinds.com/en/success_center/kss/content/release_notes/kss_9-8_release_notes.htm" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Kiwi Syslog Server", "vendor": "SolarWinds", "versions": [ { "lessThan": "9.8", "status": "affected", "version": "9.7.2 and previous versions", "versionType": "custom" } ] } ], "datePublic": "2021-10-19T00:00:00", "descriptions": [ { "lang": "en", "value": "As a result of an unquoted service path vulnerability present in the Kiwi Syslog Server Installation Wizard, a local attacker could gain escalated privileges by inserting an executable into the path of the affected service or uninstall entry. Example vulnerable path: \"Computer\\HKEY_LOCAL_MACHINE\\SYSTEM\\ControlSet001\\Services\\Kiwi Syslog Server\\Parameters\\Application\"." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 6.7, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-428", "description": "CWE-428 Unquoted Search Path or Element", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2021-10-25T13:41:01", "orgId": "49f11609-934d-4621-84e6-e02e032104d6", "shortName": "SolarWinds" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://www.solarwinds.com/trust-center/security-advisories/cve-2021-35231" }, { "tags": [ "x_refsource_MISC" ], "url": "https://documentation.solarwinds.com/en/success_center/kss/content/release_notes/kss_9-8_release_notes.htm" } ], "solutions": [ { "lang": "en", "value": "SolarWinds advises Kiwi Syslog Server customers to upgrade to the latest version (9.8) once it becomes generally available." } ], "source": { "defect": [ "CVE-2021-35231" ], "discovery": "UNKNOWN" }, "title": "Unquoted Path (SMB Login) Vulnerability", "x_generator": { "engine": "Vulnogram 0.0.9" }, "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@solarwinds.com", "DATE_PUBLIC": "2021-10-19T14:45:00.000Z", "ID": "CVE-2021-35231", "STATE": "PUBLIC", "TITLE": "Unquoted Path (SMB Login) Vulnerability" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Kiwi Syslog Server", "version": { "version_data": [ { "version_affected": "\u003c", "version_name": "9.7.2 and previous versions", "version_value": "9.8" } ] } } ] }, "vendor_name": "SolarWinds" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "As a result of an unquoted service path vulnerability present in the Kiwi Syslog Server Installation Wizard, a local attacker could gain escalated privileges by inserting an executable into the path of the affected service or uninstall entry. Example vulnerable path: \"Computer\\HKEY_LOCAL_MACHINE\\SYSTEM\\ControlSet001\\Services\\Kiwi Syslog Server\\Parameters\\Application\"." } ] }, "generator": { "engine": "Vulnogram 0.0.9" }, "impact": { "cvss": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 6.7, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-428 Unquoted Search Path or Element" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.solarwinds.com/trust-center/security-advisories/cve-2021-35231", "refsource": "MISC", "url": "https://www.solarwinds.com/trust-center/security-advisories/cve-2021-35231" }, { "name": "https://documentation.solarwinds.com/en/success_center/kss/content/release_notes/kss_9-8_release_notes.htm", "refsource": "MISC", "url": "https://documentation.solarwinds.com/en/success_center/kss/content/release_notes/kss_9-8_release_notes.htm" } ] }, "solution": [ { "lang": "en", "value": "SolarWinds advises Kiwi Syslog Server customers to upgrade to the latest version (9.8) once it becomes generally available." } ], "source": { "defect": [ "CVE-2021-35231" ], "discovery": "UNKNOWN" } } } }, "cveMetadata": { "assignerOrgId": "49f11609-934d-4621-84e6-e02e032104d6", "assignerShortName": "SolarWinds", "cveId": "CVE-2021-35231", "datePublished": "2021-10-25T13:00:29.724380Z", "dateReserved": "2021-06-22T00:00:00", "dateUpdated": "2024-09-16T18:38:19.541Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2021-35236 (GCVE-0-2021-35236)
Vulnerability from cvelistv5
Published
2021-10-27 00:57
Modified
2024-09-16 21:56
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-614 - Sensitive Cookie in HTTPS Session Without 'Secure' Attribute
Summary
The Secure flag is not set in the SSL Cookie of Kiwi Syslog Server 9.7.2 and previous versions. The Secure attribute tells the browser to only send the cookie if the request is being sent over a secure channel such as HTTPS. This will help protect the cookie from being passed over unencrypted requests. If the application can be accessed over both HTTP, there is a potential for the cookie can be sent in clear text.
References
► | URL | Tags |
---|---|---|
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
SolarWinds | Kiwi Syslog Server |
Version: 9.7.2 and Previous Versions < 9.8 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T00:33:51.218Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://documentation.solarwinds.com/en/success_center/kss/content/release_notes/kss_9-8_release_notes.htm" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.solarwinds.com/trust-center/security-advisories/cve-2021-35236" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Kiwi Syslog Server", "vendor": "SolarWinds", "versions": [ { "lessThan": "9.8", "status": "affected", "version": "9.7.2 and Previous Versions", "versionType": "custom" } ] } ], "datePublic": "2021-10-14T00:00:00", "descriptions": [ { "lang": "en", "value": "The Secure flag is not set in the SSL Cookie of Kiwi Syslog Server 9.7.2 and previous versions. The Secure attribute tells the browser to only send the cookie if the request is being sent over a secure channel such as HTTPS. This will help protect the cookie from being passed over unencrypted requests. If the application can be accessed over both HTTP, there is a potential for the cookie can be sent in clear text." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 3.1, "baseSeverity": "LOW", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-614", "description": "CWE-614 Sensitive Cookie in HTTPS Session Without \u0027Secure\u0027 Attribute", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2021-10-27T00:57:02", "orgId": "49f11609-934d-4621-84e6-e02e032104d6", "shortName": "SolarWinds" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://documentation.solarwinds.com/en/success_center/kss/content/release_notes/kss_9-8_release_notes.htm" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.solarwinds.com/trust-center/security-advisories/cve-2021-35236" } ], "solutions": [ { "lang": "en", "value": "SolarWinds advises Kiwi Syslog Server customers to upgrade to the latest version (9.8) once it becomes generally available." } ], "source": { "defect": [ "CVE-2021-35236" ], "discovery": "UNKNOWN" }, "title": "Missing Secure Flag From SSL Cookie", "x_generator": { "engine": "Vulnogram 0.0.9" }, "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@solarwinds.com", "DATE_PUBLIC": "2021-10-14T14:48:00.000Z", "ID": "CVE-2021-35236", "STATE": "PUBLIC", "TITLE": "Missing Secure Flag From SSL Cookie" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Kiwi Syslog Server", "version": { "version_data": [ { "version_affected": "\u003c", "version_name": "9.7.2 and Previous Versions", "version_value": "9.8" } ] } } ] }, "vendor_name": "SolarWinds" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The Secure flag is not set in the SSL Cookie of Kiwi Syslog Server 9.7.2 and previous versions. The Secure attribute tells the browser to only send the cookie if the request is being sent over a secure channel such as HTTPS. This will help protect the cookie from being passed over unencrypted requests. If the application can be accessed over both HTTP, there is a potential for the cookie can be sent in clear text." } ] }, "generator": { "engine": "Vulnogram 0.0.9" }, "impact": { "cvss": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 3.1, "baseSeverity": "LOW", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-614 Sensitive Cookie in HTTPS Session Without \u0027Secure\u0027 Attribute" } ] } ] }, "references": { "reference_data": [ { "name": "https://documentation.solarwinds.com/en/success_center/kss/content/release_notes/kss_9-8_release_notes.htm", "refsource": "MISC", "url": "https://documentation.solarwinds.com/en/success_center/kss/content/release_notes/kss_9-8_release_notes.htm" }, { "name": "https://www.solarwinds.com/trust-center/security-advisories/cve-2021-35236", "refsource": "MISC", "url": "https://www.solarwinds.com/trust-center/security-advisories/cve-2021-35236" } ] }, "solution": [ { "lang": "en", "value": "SolarWinds advises Kiwi Syslog Server customers to upgrade to the latest version (9.8) once it becomes generally available." } ], "source": { "defect": [ "CVE-2021-35236" ], "discovery": "UNKNOWN" } } } }, "cveMetadata": { "assignerOrgId": "49f11609-934d-4621-84e6-e02e032104d6", "assignerShortName": "SolarWinds", "cveId": "CVE-2021-35236", "datePublished": "2021-10-27T00:57:02.178772Z", "dateReserved": "2021-06-22T00:00:00", "dateUpdated": "2024-09-16T21:56:34.503Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2021-35237 (GCVE-0-2021-35237)
Vulnerability from cvelistv5
Published
2021-10-29 13:32
Modified
2024-09-16 22:50
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-1021 - Protection Mechanism Failure
Summary
A missing HTTP header (X-Frame-Options) in Kiwi Syslog Server has left customers vulnerable to click jacking. Clickjacking is an attack that occurs when an attacker uses a transparent iframe in a window to trick a user into clicking on an actionable item, such as a button or link, to another server in which they have an identical webpage. The attacker essentially hijacks the user activity intended for the original server and sends them to the other server. This is an attack on both the user and the server.
References
► | URL | Tags |
---|---|---|
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
SolarWinds | Kiwi Syslog Server |
Version: 9.7.2 and previous versions < 9.7.2 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T00:33:51.289Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://documentation.solarwinds.com/en/success_center/kss/content/release_notes/kss_9-8_release_notes.htm" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.solarwinds.com/trust-center/security-advisories/cve-2021-35237" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "Kiwi Syslog Server", "vendor": "SolarWinds", "versions": [ { "lessThan": "9.7.2", "status": "affected", "version": "9.7.2 and previous versions", "versionType": "custom" } ] } ], "datePublic": "2021-10-18T16:00:00.000Z", "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "\u003cp\u003eA missing HTTP header (X-Frame-Options) in Kiwi Syslog Server has left customers vulnerable to click jacking. Clickjacking is an attack that occurs when an attacker uses a transparent iframe in a window to trick a user into clicking on an actionable item, such as a button or link, to another server in which they have an identical webpage. The attacker essentially hijacks the user activity intended for the original server and sends them to the other server. This is an attack on both the user and the server.\u003c/p\u003e" } ], "value": "A missing HTTP header (X-Frame-Options) in Kiwi Syslog Server has left customers vulnerable to click jacking. Clickjacking is an attack that occurs when an attacker uses a transparent iframe in a window to trick a user into clicking on an actionable item, such as a button or link, to another server in which they have an identical webpage. The attacker essentially hijacks the user activity intended for the original server and sends them to the other server. This is an attack on both the user and the server." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 5, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-1021", "description": "CWE-1021 Protection Mechanism Failure", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-08-03T20:31:25.943Z", "orgId": "49f11609-934d-4621-84e6-e02e032104d6", "shortName": "SolarWinds" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://documentation.solarwinds.com/en/success_center/kss/content/release_notes/kss_9-8_release_notes.htm" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.solarwinds.com/trust-center/security-advisories/cve-2021-35237" } ], "solutions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "\u003cp\u003eSolarWinds has fixed the vulnerability by configuring the X-Frame-Options header. It is recommended that Kiwi Syslog Server customers to upgrade to the latest version (9.8) once it becomes generally available which now uses Microsoft IIS as the web server.\u003c/p\u003e" } ], "value": "SolarWinds has fixed the vulnerability by configuring the X-Frame-Options header. It is recommended that Kiwi Syslog Server customers to upgrade to the latest version (9.8) once it becomes generally available which now uses Microsoft IIS as the web server." } ], "source": { "defect": [ "CVE-2021-35237" ], "discovery": "UNKNOWN" }, "title": "Clickjacking Vulnerability", "x_generator": { "engine": "Vulnogram 0.0.9" }, "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@solarwinds.com", "DATE_PUBLIC": "2021-10-19T12:30:00.000Z", "ID": "CVE-2021-35237", "STATE": "PUBLIC", "TITLE": "Clickjacking Vulnerability" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Kiwi Syslog Server", "version": { "version_data": [ { "version_affected": "\u003c", "version_name": "9.7.2 and previous versions", "version_value": "9.7.2" } ] } } ] }, "vendor_name": "SolarWinds" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A missing HTTP header (X-Frame-Options) in Kiwi Syslog Server has left customers vulnerable to click jacking. Clickjacking is an attack that occurs when an attacker uses a transparent iframe in a window to trick a user into clicking on an actionable item, such as a button or link, to another server in which they have an identical webpage. The attacker essentially hijacks the user activity intended for the original server and sends them to the other server. This is an attack on both the user and the server." } ] }, "generator": { "engine": "Vulnogram 0.0.9" }, "impact": { "cvss": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 5, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-693 Protection Mechanism Failure" } ] } ] }, "references": { "reference_data": [ { "name": "https://documentation.solarwinds.com/en/success_center/kss/content/release_notes/kss_9-8_release_notes.htm", "refsource": "MISC", "url": "https://documentation.solarwinds.com/en/success_center/kss/content/release_notes/kss_9-8_release_notes.htm" }, { "name": "https://www.solarwinds.com/trust-center/security-advisories/cve-2021-35237", "refsource": "MISC", "url": "https://www.solarwinds.com/trust-center/security-advisories/cve-2021-35237" } ] }, "solution": [ { "lang": "en", "value": "SolarWinds has fixed the vulnerability by configuring the X-Frame-Options header. It is recommended that Kiwi Syslog Server customers to upgrade to the latest version (9.8) once it becomes generally available which now uses Microsoft IIS as the web server." } ], "source": { "defect": [ "CVE-2021-35237" ], "discovery": "UNKNOWN" } } } }, "cveMetadata": { "assignerOrgId": "49f11609-934d-4621-84e6-e02e032104d6", "assignerShortName": "SolarWinds", "cveId": "CVE-2021-35237", "datePublished": "2021-10-29T13:32:18.489198Z", "dateReserved": "2021-06-22T00:00:00", "dateUpdated": "2024-09-16T22:50:51.483Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }