Vulnerabilities > CVE-2014-5504 - Credentials Management vulnerability in Solarwinds LOG and Event Manager

047910
CVSS 7.5 - HIGH
Attack vector
NETWORK
Attack complexity
LOW
Privileges required
NONE
Confidentiality impact
PARTIAL
Integrity impact
PARTIAL
Availability impact
PARTIAL
network
low complexity
solarwinds
CWE-255
nessus

Summary

SolarWinds Log and Event Manager before 6.0 uses "static" credentials, which makes it easier for remote attackers to obtain access to the database and execute arbitrary code via unspecified vectors, related to HyperSQL.

Common Weakness Enumeration (CWE)

Nessus

NASL familyCGI abuses
NASL idSOLARWINDS_LEM_6_0_1.NASL
descriptionAccording to its self-reported version number, the installation of SolarWinds Log and Event Manager on the remote host is a version prior to 6.0.1. It is, therefore, affected by a flaw in HyperSQL that allows a remote, unauthenticated user to execute arbitrary code under the context of the database on the remote host. Note that some instances of version 6.0.0 may not be affected. Contact the vendor for more information. Note that Nessus has not tested for this issue but has instead relied only on the application
last seen2020-06-01
modified2020-06-02
plugin id78915
published2014-11-07
reporterThis script is Copyright (C) 2014-2018 Tenable Network Security, Inc.
sourcehttps://www.tenable.com/plugins/nessus/78915
titleSolarWinds Log and Event Manager < 6.0.1 HyperSQL Remote Code Execution
code
#
# (C) Tenable Network Security, Inc.
#

include("compat.inc");

if (description)
{
  script_id(78915);
  script_version("1.3");
  script_cvs_date("Date: 2018/11/15 20:50:18");

  script_cve_id("CVE-2014-5504");
  script_bugtraq_id(69559);

  script_name(english:"SolarWinds Log and Event Manager < 6.0.1 HyperSQL Remote Code Execution");
  script_summary(english:"Checks the version.");

  script_set_attribute(attribute:"synopsis", value:
"The remote web application is affected by a remote code execution
vulnerability.");
  script_set_attribute(attribute:"description", value:
"According to its self-reported version number, the installation of
SolarWinds Log and Event Manager on the remote host is a version prior
to 6.0.1. It is, therefore, affected by a flaw in HyperSQL that allows
a remote, unauthenticated user to execute arbitrary code under the
context of the database on the remote host.

Note that some instances of version 6.0.0 may not be affected. Contact
the vendor for more information.

Note that Nessus has not tested for this issue but has instead relied
only on the application's self-reported version number.");
  # https://www.zerodayinitiative.com/advisories/ZDI-14-303/
  script_set_attribute(attribute:"see_also", value:"http://www.nessus.org/u?3853b7d8");
  # https://support.solarwinds.com/Success_Center/Log_Event_Manager_(LEM)/LEM_Documentation/release_notes
  script_set_attribute(attribute:"see_also", value:"http://www.nessus.org/u?244c12ad");
  script_set_attribute(attribute:"solution", value:"Upgrade to SolarWinds Log and Event Manager version 6.0.1 or later.");
  script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P");
  script_set_cvss_temporal_vector("CVSS2#E:U/RL:OF/RC:C");
  script_set_attribute(attribute:"exploitability_ease", value:"No exploit is required");
  script_set_attribute(attribute:"exploit_available", value:"false");

  script_set_attribute(attribute:"vuln_publication_date", value:"2014/09/03");
  script_set_attribute(attribute:"patch_publication_date", value:"2014/08/26");
  script_set_attribute(attribute:"plugin_publication_date", value:"2014/11/07");

  script_set_attribute(attribute:"cpe", value:"cpe:/a:solarwinds:log_and_event_manager");
  script_set_attribute(attribute:"plugin_type", value:"remote");
  script_end_attributes();

  script_category(ACT_GATHER_INFO);
  script_family(english:"CGI abuses");

  script_copyright(english:"This script is Copyright (C) 2014-2018 Tenable Network Security, Inc.");

  script_dependencies("solarwinds_lem_detect.nbin");
  script_require_keys("installed_sw/SolarWinds Log and Event Manager");
  script_require_ports("Services/www", 8080, 8443);

  exit(0);
}

include("audit.inc");
include("global_settings.inc");
include("misc_func.inc");
include("http.inc");
include("install_func.inc");

port = get_http_port(default:8080);

app  = "SolarWinds Log and Event Manager";
install = get_single_install(app_name:app, port:port, exit_if_unknown_ver:TRUE);

dir        = install['path'];
version    = install['version'];
version_ui = install['display_version'];

install_url = build_url(port:port, qs:dir);

# Only report on version 6.0.0 if running with Paranoid reporting
if (version == "6.0.0" && report_paranoia < 2)
  exit(0, "The install of " + app + " is version " + version_ui + " and may be affected. Refer to the vendor for more information.");

fix = "6.0.1";
if (ver_compare(ver:version, fix:fix, strict:FALSE) < 0)
{
  if (report_verbosity > 0)
  {
    report =
    '\n  URL               : ' + install_url +
    '\n  Installed version : ' + version_ui +
    '\n  Fixed version     : ' + fix +
    '\n';
    security_hole(port:port, extra:report);
  }
  else security_hole(port);
  exit(0);
}
else audit(AUDIT_WEB_APP_NOT_AFFECTED, app, install_url, version_ui);