We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2016-4350



Description

Multiple SQL injection vulnerabilities in the Web Services web server in SolarWinds Storage Resource Monitor (SRM) Profiler (formerly Storage Manager (STM)) before 6.2.3 allow remote attackers to execute arbitrary SQL commands via the (1) ScriptSchedule parameter in the ScriptServlet servlet; the (2) winEventId or (3) winEventLog parameter in the WindowsEventLogsServlet servlet; the (4) processOS parameter in the ProcessesServlet servlet; the (5) group, (6) groupName, or (7) clientName parameter in the BackupExceptionsServlet servlet; the (8) valDB or (9) valFS parameter in the BackupAssociationServlet servlet; the (10) orderBy or (11) orderDir parameter in the HostStorageServlet servlet; the (12) fileName, (13) sortField, or (14) sortDirection parameter in the DuplicateFilesServlet servlet; the (15) orderFld or (16) orderDir parameter in the QuantumMonitorServlet servlet; the (17) exitCode parameter in the NbuErrorMessageServlet servlet; the (18) udfName, (19) displayName, (20) udfDescription, (21) udfDataValue, (22) udfSectionName, or (23) udfId parameter in the UserDefinedFieldConfigServlet servlet; the (24) sortField or (25) sortDirection parameter in the XiotechMonitorServlet servlet; the (26) sortField or (27) sortDirection parameter in the BexDriveUsageSummaryServlet servlet; the (28) state parameter in the ScriptServlet servlet; the (29) assignedNames parameter in the FileActionAssignmentServlet servlet; the (30) winEventSource parameter in the WindowsEventLogsServlet servlet; or the (31) name, (32) ipOne, (33) ipTwo, or (34) ipThree parameter in the XiotechMonitorServlet servlet.

Reserved 2016-04-29 | Published 2016-05-09 | Updated 2024-08-06 | Assigner mitre

References

www.zerodayinitiative.com/advisories/ZDI-16-254

www.zerodayinitiative.com/advisories/ZDI-16-259

www.zerodayinitiative.com/advisories/ZDI-16-272

www.zerodayinitiative.com/advisories/ZDI-16-252

www.zerodayinitiative.com/advisories/ZDI-16-256

www.zerodayinitiative.com/advisories/ZDI-16-265

www.zerodayinitiative.com/advisories/ZDI-16-270

www.zerodayinitiative.com/advisories/ZDI-16-266

www.zerodayinitiative.com/advisories/ZDI-16-257

www.zerodayinitiative.com/advisories/ZDI-16-263

www.zerodayinitiative.com/advisories/ZDI-16-271

www.zerodayinitiative.com/advisories/ZDI-16-262

www.zerodayinitiative.com/advisories/ZDI-16-253

www.zerodayinitiative.com/advisories/ZDI-16-250

www.zerodayinitiative.com/advisories/ZDI-16-268

www.zerodayinitiative.com/advisories/ZDI-16-260

www.zerodayinitiative.com/advisories/ZDI-16-251

www.zerodayinitiative.com/advisories/ZDI-16-264

www.zerodayinitiative.com/advisories/ZDI-16-261

www.zerodayinitiative.com/advisories/ZDI-16-267

www.zerodayinitiative.com/advisories/ZDI-16-249

www.zerodayinitiative.com/advisories/ZDI-16-269

www.solarwinds.com/...ger/docs/ReleaseNotes/releaseNotes.htm

www.zerodayinitiative.com/advisories/ZDI-16-255

www.zerodayinitiative.com/advisories/ZDI-16-258

cve.org (CVE-2016-4350)

nvd.nist.gov (CVE-2016-4350)

Download JSON

Share this page
https://cve.threatint.eu/CVE/CVE-2016-4350

Support options

Helpdesk Chat, Email, Knowledgebase