SolarWinds Platform Directory Traversal
(CVE-2022-47506)
Summary
SolarWinds Platform was susceptible to the Directory Traversal Vulnerability. This vulnerability allows a local adversary with authenticated account access to edit the default configuration, enabling the execution of arbitrary commands.
Affected Products
- SolarWinds Platform 2022.4.1
Fixed Software Release
- SolarWinds Platform 2023.1
Acknowledgments
- Piotr Bazydlo (@chudypb) of Trend Micro Zero Day Initiative
Workarounds
SolarWinds recommends customers upgrade to SolarWinds Platform version 2023.1 as soon as it becomes available. The expected release is by the end of February 2023. SolarWinds also recommends customers to follow the guidance provided in the SolarWinds Secure Configuration Guide. Ensure only authorized users can access the SolarWinds Platform. Special attention should be given to the following points from the documentation:
- Be careful not to expose your SolarWinds Platform website on the public internet. If you must enable outbound internet access from SolarWinds servers, create a strict allow list and block all other traffic. See SolarWinds Platform Product Features Affected by Internet Access.
- Disable unnecessary ports, protocols, and services on your host operating system and on applications like SQL Server. For more details, see the SolarWinds Port Requirements guide and Best practices for configuring Windows Defender Firewall (© 2023 Microsoft, available at https://docs.microsoft.com, obtained on January 10, 2023.)
- Apply proper segmentation controls on the network where you have deployed the SolarWinds Platform and SQL Server instances.
Advisory Details
Severity
8.8 High
Advisory ID
First Published
02/15/2023
Last Updated
02/15/2023
Fixed Version
SolarWinds Platform 2023.1