#VU57856 Protection Mechanism Failure in Kiwi Syslog Server - CVE-2021-35237

 

#VU57856 Protection Mechanism Failure in Kiwi Syslog Server - CVE-2021-35237

Published: November 2, 2021


Vulnerability identifier: #VU57856
Vulnerability risk: Medium
CVSSv4.0: CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:A/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:U/U:Green
CVE-ID: CVE-2021-35237
CWE-ID: CWE-693
Exploitation vector: Remote access
Exploit availability: No public exploit available
Vulnerable software:
Kiwi Syslog Server
Software vendor:
SolarWinds

Description

The vulnerability allows a remote attacker to bypass implemented security restrictions.

The vulnerability exists due to a missing HTTP header (X-Frame-Options). A remote attacker can trick a victim to click on an actionable item, hijack the user activity intended for the original server and send them to the other server.


Remediation

Install updates from vendor's website.

External links