8.8
CVSSv3

CVE-2021-35215

Published: 01/09/2021 Updated: 03/11/2021
CVSS v2 Base Score: 6.5 | Impact Score: 6.4 | Exploitability Score: 8
CVSS v3 Base Score: 8.8 | Impact Score: 5.9 | Exploitability Score: 2.8
VMScore: 578
Vector: AV:N/AC:L/Au:S/C:P/I:P/A:P

Vulnerability Summary

This vulnerability allows remote malicious users to execute arbitrary code on affected installations of SolarWinds Orion Platform. Authentication is required to exploit this vulnerability. The specific flaw exists within the ActionPluginBaseView class. The issue results from the lack of proper validation of user-supplied data, which can result in deserialization of untrusted data. An attacker can leverage this vulnerability to execute code in the context of NETWORK SERVICE.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

solarwinds orion platform

Github Repositories

SolarWinds Orion Platform ActionPluginBaseView 反序列化RCE

CVE-2021-35215 SolarWinds Orion Platform ActionPluginBaseView 反序列化RCE,需要登录。 PoC POST /Orion/RenderControlaspx HTTP/11 Host: 192168137130:8787 Content-Length: 3648 Cache-Control: max-age=0 Origin: 192168137130:8787 Upgrade-Insecure-Requests: 1 DNT: 1 Content-Type: application/x-www-form-urlencoded User-Agent: Mozilla/50 (Windows NT 100; Win64