The SolarWinds Access Rights Manager (ARM) was found to be susceptible to a Directory Traversal Remote Code Execution Vulnerability. If exploited, this vulnerability allows an unauthenticated user to achieve a Remote Code Execution.
References
Link | Resource |
---|---|
https://www.solarwinds.com/trust-center/security-advisories/CVE-2024-23477 | Patch Vendor Advisory |
Configurations
History
20 Feb 2024, 20:38
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:a:solarwinds:access_rights_manager:*:*:*:*:*:*:*:* | |
References | () https://www.solarwinds.com/trust-center/security-advisories/CVE-2024-23477 - Patch, Vendor Advisory | |
First Time |
Solarwinds
Solarwinds access Rights Manager |
|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 9.6 |
CWE | CWE-22 |
15 Feb 2024, 21:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-02-15 21:15
Updated : 2024-02-28 20:54
NVD link : CVE-2024-23477
Mitre link : CVE-2024-23477
CVE.ORG link : CVE-2024-23477
JSON object : View
Products Affected
solarwinds
- access_rights_manager
CWE
CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')