#VU57856 Protection Mechanism Failure in Kiwi Syslog Server


Published: 2021-11-02

Vulnerability identifier: #VU57856

Vulnerability risk: Medium

CVSSv3.1: 4.4 [CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L/E:U/RL:O/RC:C]

CVE-ID: CVE-2021-35237

CWE-ID: CWE-693

Exploitation vector: Network

Exploit availability: No

Vulnerable software:
Kiwi Syslog Server
Server applications / Other server solutions

Vendor: SolarWinds

Description

The vulnerability allows a remote attacker to bypass implemented security restrictions.

The vulnerability exists due to a missing HTTP header (X-Frame-Options). A remote attacker can trick a victim to click on an actionable item, hijack the user activity intended for the original server and send them to the other server.

Mitigation
Install updates from vendor's website.

Vulnerable software versions

Kiwi Syslog Server: 9.7 - 9.7.2


External links
http://documentation.solarwinds.com/en/success_center/kss/content/release_notes/kss_9-8_release_notes.htm
http://www.solarwinds.com/trust-center/security-advisories/cve-2021-35237


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.


Latest bulletins with this vulnerability