SolarWinds Access Rights Manager में डायरेक्टरी ट्रैवर्सल और सूचना प्रकटीकरण भेद्यता
प्लेटफ़ॉर्म
solarwinds
घटक
access-rights-manager
में ठीक किया गया
2023.2.5
CVE-2024-23475 represents a critical Directory Traversal and Information Disclosure vulnerability affecting SolarWinds Access Rights Manager. This flaw allows unauthenticated users to perform arbitrary file deletion and leak sensitive information, potentially leading to significant data breaches and system compromise. The vulnerability impacts versions of SolarWinds Access Rights Manager up to and including 2023.2.4. A patch is available in version 2024-3.
प्रभाव और हमले की स्थितियाँअनुवाद हो रहा है…
The impact of CVE-2024-23475 is severe due to its unauthenticated nature and the potential for arbitrary file deletion and information disclosure. An attacker could leverage this vulnerability to delete critical configuration files, database backups, or other sensitive data stored on the system. Successful exploitation could also lead to the exposure of credentials, personally identifiable information (PII), or proprietary business data. The ability to delete files could disrupt services and render the Access Rights Manager unusable, causing significant operational downtime. The lack of authentication required for exploitation dramatically increases the attack surface and potential for widespread compromise.
शोषण संदर्भअनुवाद हो रहा है…
CVE-2024-23475 was publicly disclosed on July 17, 2024. Its CRITICAL CVSS score (9.6) indicates a high probability of exploitation. While no public proof-of-concept (PoC) has been widely released at the time of writing, the ease of exploitation inherent in directory traversal vulnerabilities suggests that a PoC is likely to emerge. The vulnerability has been added to the CISA KEV catalog, signifying a heightened level of concern and potential for exploitation in critical infrastructure environments.
कौन जोखिम में हैअनुवाद हो रहा है…
Organizations heavily reliant on SolarWinds Access Rights Manager for access control and privilege management are particularly at risk. Environments with limited network segmentation or inadequate access controls are also more vulnerable. Shared hosting environments where multiple customers share the same server infrastructure could experience widespread compromise if one customer's Access Rights Manager instance is exploited.
पहचान के चरणअनुवाद हो रहा है…
• windows / server:
Get-WinEvent -LogName Security -Filter "EventID = 4663 -MessageText '*\*'"; Get-Process -Name 'swarrm' | Select-Object -ExpandProperty Path• windows / server:
Get-ScheduledTask | Where-Object {$_.TaskName -like '*swarrm*'} | Select-Object -ExpandProperty Actions• generic web:
curl -I 'http://<target>/../../../../etc/passwd' # Check for directory traversal responseहमले की समयरेखा
- Disclosure
disclosure
- Patch
patch
खतरा खुफिया
एक्सप्लॉइट स्थिति
EPSS
0.24% (48% शतमक)
CISA SSVC
CVSS वेक्टर
इन मेट्रिक्स का क्या मतलब है?
- Attack Vector
- आसन्न — नेटवर्क निकटता आवश्यक: समान LAN, Bluetooth या स्थानीय वायरलेस।
- Attack Complexity
- निम्न — कोई विशेष शर्त नहीं। विश्वसनीय रूप से शोषण योग्य।
- Privileges Required
- कोई नहीं — बिना प्रमाणीकरण के शोषण योग्य।
- User Interaction
- कोई नहीं — स्वचालित और मूक हमला। पीड़ित कुछ नहीं करता।
- Scope
- बदला हुआ — हमला कमज़ोर घटक से परे अन्य प्रणालियों तक फैल सकता है।
- Confidentiality
- उच्च — पूर्ण गोपनीयता हानि। हमलावर सभी डेटा पढ़ सकता है।
- Integrity
- उच्च — हमलावर कोई भी डेटा लिख, बदल या हटा सकता है।
- Availability
- उच्च — पूर्ण क्रैश या संसाधन समाप्ति। पूर्ण सेवा से इनकार।
प्रभावित सॉफ्टवेयर
कमजोरी वर्गीकरण (CWE)
समयरेखा
- आरक्षित
- प्रकाशित
- संशोधित
- EPSS अद्यतन
शमन और वर्कअराउंडअनुवाद हो रहा है…
The primary mitigation for CVE-2024-23475 is to upgrade SolarWinds Access Rights Manager to version 2024-3 or later, which contains the fix. If an immediate upgrade is not possible, consider implementing temporary workarounds. Restrict network access to the Access Rights Manager server to only authorized personnel. Implement strict file permissions to limit the impact of potential file deletion. Monitor system logs for suspicious activity, particularly attempts to access or modify files outside of expected directories. Consider using a Web Application Firewall (WAF) to filter out malicious requests attempting to exploit directory traversal vulnerabilities. After upgrading, confirm the vulnerability is resolved by attempting a directory traversal request and verifying that access is denied.
कैसे ठीक करें
SolarWinds Access Rights Manager को संस्करण 2024-3 या बाद के संस्करण में अपडेट करें। अपडेट डायरेक्टरी ट्रैवर्सल और सूचना प्रकटीकरण भेद्यता को ठीक करता है। अपडेट के बारे में विस्तृत निर्देशों के लिए रिलीज़ नोट्स देखें।
CVE सुरक्षा न्यूज़लेटर
भेद्यता विश्लेषण और गंभीर अलर्ट सीधे आपके ईमेल में।
अक्सर पूछे जाने वाले सवालअनुवाद हो रहा है…
What is CVE-2024-23475 — Directory Traversal in SolarWinds Access Rights Manager?
CVE-2024-23475 is a critical vulnerability allowing unauthenticated attackers to delete files and leak sensitive information in SolarWinds Access Rights Manager versions up to 2023.2.4.
Am I affected by CVE-2024-23475 in SolarWinds Access Rights Manager?
You are affected if you are running SolarWinds Access Rights Manager versions 2023.2.4 or earlier. Upgrade to 2024-3 or later to mitigate the risk.
How do I fix CVE-2024-23475 in SolarWinds Access Rights Manager?
Upgrade SolarWinds Access Rights Manager to version 2024-3 or later. Implement temporary workarounds like restricting network access and monitoring logs if an immediate upgrade is not possible.
Is CVE-2024-23475 being actively exploited?
While no widespread exploitation has been confirmed, the vulnerability's severity and ease of exploitation suggest a high likelihood of active exploitation.
Where can I find the official SolarWinds advisory for CVE-2024-23475?
Refer to the official SolarWinds security advisory for detailed information and remediation steps: [https://www.solarwinds.com/securityadvisories](https://www.solarwinds.com/securityadvisories)
क्या आपका प्रोजेक्ट प्रभावित है?
अपनी डिपेंडेंसी फ़ाइल अपलोड करें और तुरंत जानें कि यह CVE और अन्य आपको प्रभावित करती हैं या नहीं।