Vulnerability identifier: #VU57856
Vulnerability risk: Medium
CVSSv3.1: 4.4 [CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L/E:U/RL:O/RC:C]
CVE-ID:
CWE-ID:
CWE-693
Exploitation vector: Network
Exploit availability: No
Vulnerable software:
Kiwi Syslog Server
Server applications /
Other server solutions
Vendor: SolarWinds
Description
The vulnerability allows a remote attacker to bypass implemented security restrictions.
The vulnerability exists due to a missing HTTP header (X-Frame-Options). A remote attacker can trick a victim to click on an actionable item, hijack the user activity intended for the original server and send them to the other server.
Mitigation
Install updates from vendor's website.
Vulnerable software versions
Kiwi Syslog Server: 9.7 - 9.7.2
External links
http://documentation.solarwinds.com/en/success_center/kss/content/release_notes/kss_9-8_release_notes.htm
http://www.solarwinds.com/trust-center/security-advisories/cve-2021-35237
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.