Description
This vulnerability allows remote attackers to escalate privileges on affected installations of SolarWinds Network Performance Monitor 2020 HF1, NPM: 2020.2. Authentication is required to exploit this vulnerability. The specific flaw exists within the WriteToFile method. The issue results from the lack of proper validation of a user-supplied string before using it to construct SQL queries. An attacker can leverage this vulnerability to escalate privileges and reset the password for the Admin user. Was ZDI-CAN-11804.
Analysis and contextual insights are available on OpenCVE Cloud.
Remediation
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
Advisories
No advisories yet.
References
| Link | Providers |
|---|---|
| https://www.zerodayinitiative.com/advisories/ZDI-21-064/ |
|
History
No history.
Status: PUBLISHED
Assigner: zdi
Published:
Updated: 2024-08-04T16:25:43.921Z
Reserved: 2020-10-27T00:00:00.000Z
Link: CVE-2020-27869
No data.
Status : Modified
Published: 2021-02-12T00:15:13.140
Modified: 2024-11-21T05:21:58.157
Link: CVE-2020-27869
No data.
OpenCVE Enrichment
No data.
Weaknesses