This vulnerability allows remote attackers to execute arbitrary code on affected installations of SolarWinds Orion Job Scheduler 2020.2.1 HF 2. Authentication is required to exploit this vulnerability. The specific flaw exists within the JobRouterService WCF service. The issue is due to the WCF service configuration, which allows a critical resource to be accessed by unprivileged users. An attacker can leverage this vulnerability to execute code in the context of an administrator. Was ZDI-CAN-12007.
References
Link | Resource |
---|---|
https://documentation.solarwinds.com/en/success_center/orionplatform/content/release_notes/orion_platform_2020-2-5_release_notes.htm | Release Notes Vendor Advisory |
https://www.zerodayinitiative.com/advisories/ZDI-21-605/ | Third Party Advisory VDB Entry |
https://documentation.solarwinds.com/en/success_center/orionplatform/content/release_notes/orion_platform_2020-2-5_release_notes.htm | Release Notes Vendor Advisory |
https://www.zerodayinitiative.com/advisories/ZDI-21-605/ | Third Party Advisory VDB Entry |
Configurations
History
21 Nov 2024, 06:05
Type | Values Removed | Values Added |
---|---|---|
References | () https://documentation.solarwinds.com/en/success_center/orionplatform/content/release_notes/orion_platform_2020-2-5_release_notes.htm - Release Notes, Vendor Advisory | |
References | () https://www.zerodayinitiative.com/advisories/ZDI-21-605/ - Third Party Advisory, VDB Entry |
Information
Published : 2021-05-21 15:15
Updated : 2024-11-21 06:05
NVD link : CVE-2021-31475
Mitre link : CVE-2021-31475
CVE.ORG link : CVE-2021-31475
JSON object : View
Products Affected
solarwinds
- orion_job_scheduler
CWE
CWE-732
Incorrect Permission Assignment for Critical Resource