SB2021110219 - Multiple vulnerabilities in SolarWinds Kiwi Syslog Server



SB2021110219 - Multiple vulnerabilities in SolarWinds Kiwi Syslog Server

Published: November 2, 2021

Security Bulletin ID SB2021110219
Severity
Medium
Patch available
YES
Number of vulnerabilities 5
Exploitation vector Remote access
Highest impact Code execution

Breakdown by Severity

Medium 60% Low 40%
  • Low
  • Medium
  • High
  • Critical

Description

This security bulletin contains information about 5 secuirty vulnerabilities.


1) Protection Mechanism Failure (CVE-ID: CVE-2021-35237)

The vulnerability allows a remote attacker to bypass implemented security restrictions.

The vulnerability exists due to a missing HTTP header (X-Frame-Options). A remote attacker can trick a victim to click on an actionable item, hijack the user activity intended for the original server and send them to the other server.


2) Information disclosure (CVE-ID: CVE-2021-35236)

The vulnerability allows a remote attacker to gain access to potentially sensitive information.

The vulnerability exists due to the Secure flag is not set in the SSL Cookie. A remote attacker can gain unauthorized access to sensitive information on the system.


3) Unquoted Search Path or Element (CVE-ID: CVE-2021-35231)

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to an unquoted service path in the Installation Wizard. A local administrator can insert an executable into the path of the affected service and gain elevated privileges on the target system.


4) Information disclosure (CVE-ID: CVE-2021-35233)

The vulnerability allows a remote attacker to gain access to potentially sensitive information.

The vulnerability exists due to the HTTP TRACK & TRACE methods are enabled. A remote attacker can gain unauthorized access to sensitive information on the system.


5) Information disclosure (CVE-ID: CVE-2021-35235)

The vulnerability allows a remote attacker to gain access to potentially sensitive information.

The vulnerability exists due to the ASP.NET debug feature is enabled by default. A remote attacker can start a debugging session and gain unauthorized access to sensitive information on the system.


Remediation

Install update from vendor's website.