The HTTP TRACK & TRACE methods were enabled in Kiwi Syslog Server 9.7.1 and earlier. These methods are intended for diagnostic purposes only. If enabled, the web server will respond to requests that use these methods by returning exact HTTP request that was received in the response to the client. This may lead to the disclosure of sensitive information such as internal authentication headers appended by reverse proxies.
References
Link | Resource |
---|---|
https://documentation.solarwinds.com/en/success_center/kss/content/release_notes/kss_9-8_release_notes.htm | Release Notes Vendor Advisory |
https://www.solarwinds.com/trust-center/security-advisories/CVE-2021-35233 | Release Notes Vendor Advisory |
https://documentation.solarwinds.com/en/success_center/kss/content/release_notes/kss_9-8_release_notes.htm | Release Notes Vendor Advisory |
https://www.solarwinds.com/trust-center/security-advisories/CVE-2021-35233 | Release Notes Vendor Advisory |
Configurations
History
21 Nov 2024, 06:12
Type | Values Removed | Values Added |
---|---|---|
References | () https://documentation.solarwinds.com/en/success_center/kss/content/release_notes/kss_9-8_release_notes.htm - Release Notes, Vendor Advisory | |
References | () https://www.solarwinds.com/trust-center/security-advisories/CVE-2021-35233 - Release Notes, Vendor Advisory |
Information
Published : 2021-10-27 01:15
Updated : 2024-11-21 06:12
NVD link : CVE-2021-35233
Mitre link : CVE-2021-35233
CVE.ORG link : CVE-2021-35233
JSON object : View
Products Affected
solarwinds
- kiwi_syslog_server
CWE