{"vuid":"VU#174119","idnumber":"174119","name":"Solarwinds Network Performance Monitor 10.2.2 contains multiple vulnerabilities","keywords":["solarwinds","csrf","xss"],"overview":"Solarwinds Network Performance Monitor 10.2.2 and possibly earlier versions contain a cross-site scripting (XSS), and cross-site request forgery (CSRF) vulnerability.","clean_desc":"Solarwinds Network Performance Monitor 10.2.2 can be attacked by modifying the snmpd.conf file with malicious JavaScript (XSS) (CWE-79) (CVE-2012-2577). The malicious JavaScript is stored in the application and then may be leveraged to mount an CSRF (CWE-352) (CVE-2012-2602) attack against a logged on administrator.","impact":"A remote unauthenticated attacker may obtain sensitive information, cause a denial of service condition or execute arbitrary code with the privileges of the application.","resolution":"Apply an Update Solarwinds has released Network Performance Monitor 10.3.1 to address these vulnerabilities. Customers may obtain the update from the Solarwinds Customer Portal.","workarounds":"Restrict access As a general good security practice, only allow connections from trusted hosts and networks. Note that restricting access does not prevent XSS or CSRF attacks since the attack comes as an HTTP request from a legitimate user's host. Restricting access would prevent an attacker from accessing a web interface using stolen credentials from a blocked network location.","sysaffected":"","thanks":"Thanks to Offensive Security for reporting these vulnerabilities.","author":"This document was written by Jared Allar.","public":["h","t","t","p",":","/","/","w","w","w",".","s","o","l","a","r","w","i","n","d","s",".","c","o","m","/","d","o","c","u","m","e","n","t","a","t","i","o","n","/","O","r","i","o","n","/","d","o","c","s","/","R","e","l","e","a","s","e","N","o","t","e","s","/","r","e","l","e","a","s","e","N","o","t","e","s",".","h","t","m"],"cveids":["CVE-2012-2602","CVE-2012-2577"],"certadvisory":"","uscerttechnicalalert":null,"datecreated":"2012-05-30T13:09:58Z","publicdate":"2012-07-20T00:00:00Z","datefirstpublished":"2012-08-03T13:38:50Z","dateupdated":"2014-08-15T02:45:07Z","revision":17,"vrda_d1_directreport":"1","vrda_d1_population":"1","vrda_d1_impact":"3","cam_widelyknown":"0","cam_exploitation":"0","cam_internetinfrastructure":"0","cam_population":"0","cam_impact":"0","cam_easeofexploitation":"0","cam_attackeraccessrequired":"0","cam_scorecurrent":"0","cam_scorecurrentwidelyknown":"0","cam_scorecurrentwidelyknownexploited":"0","ipprotocol":"","cvss_accessvector":"N","cvss_accesscomplexity":"M","cvss_authentication":null,"cvss_confidentialityimpact":"P","cvss_integrityimpact":"P","cvss_availabilityimpact":"P","cvss_exploitablity":null,"cvss_remediationlevel":"OF","cvss_reportconfidence":"C","cvss_collateraldamagepotential":"ND","cvss_targetdistribution":"L","cvss_securityrequirementscr":"ND","cvss_securityrequirementsir":"ND","cvss_securityrequirementsar":"ND","cvss_basescore":"6.8","cvss_basevector":"AV:N/AC:M/Au:N/C:P/I:P/A:P","cvss_temporalscore":"5.3","cvss_environmentalscore":"1.33547225100581","cvss_environmentalvector":"CDP:ND/TD:L/CR:ND/IR:ND/AR:ND","metric":0.0,"vulnote":null}