Multiple SQL injection vulnerabilities in the Web Services web server in SolarWinds Storage Resource Monitor (SRM) Profiler (formerly Storage Manager (STM)) before 6.2.3 allow remote attackers to execute arbitrary SQL commands via the (1) ScriptSchedule parameter in the ScriptServlet servlet; the (2) winEventId or (3) winEventLog parameter in the WindowsEventLogsServlet servlet; the (4) processOS parameter in the ProcessesServlet servlet; the (5) group, (6) groupName, or (7) clientName parameter in the BackupExceptionsServlet servlet; the (8) valDB or (9) valFS parameter in the BackupAssociationServlet servlet; the (10) orderBy or (11) orderDir parameter in the HostStorageServlet servlet; the (12) fileName, (13) sortField, or (14) sortDirection parameter in the DuplicateFilesServlet servlet; the (15) orderFld or (16) orderDir parameter in the QuantumMonitorServlet servlet; the (17) exitCode parameter in the NbuErrorMessageServlet servlet; the (18) udfName, (19) displayName, (20) udfDescription, (21) udfDataValue, (22) udfSectionName, or (23) udfId parameter in the UserDefinedFieldConfigServlet servlet; the (24) sortField or (25) sortDirection parameter in the XiotechMonitorServlet servlet; the (26) sortField or (27) sortDirection parameter in the BexDriveUsageSummaryServlet servlet; the (28) state parameter in the ScriptServlet servlet; the (29) assignedNames parameter in the FileActionAssignmentServlet servlet; the (30) winEventSource parameter in the WindowsEventLogsServlet servlet; or the (31) name, (32) ipOne, (33) ipTwo, or (34) ipThree parameter in the XiotechMonitorServlet servlet.
References
Link Providers
https://www.spirityenterprise.com/hardening spirity
https://www.spirityenterprise.com/pentest spirity
https://www.spirityenterprise.com/managed-detection-response spirity
http://www.solarwinds.com/documentation/storage/storagemanager/docs/ReleaseNotes/releaseNotes.htm cve-icon cve-icon
http://www.zerodayinitiative.com/advisories/ZDI-16-249 cve-icon cve-icon
http://www.zerodayinitiative.com/advisories/ZDI-16-250 cve-icon cve-icon
http://www.zerodayinitiative.com/advisories/ZDI-16-251 cve-icon cve-icon
http://www.zerodayinitiative.com/advisories/ZDI-16-252 cve-icon cve-icon
http://www.zerodayinitiative.com/advisories/ZDI-16-253 cve-icon cve-icon
http://www.zerodayinitiative.com/advisories/ZDI-16-254 cve-icon cve-icon
http://www.zerodayinitiative.com/advisories/ZDI-16-255 cve-icon cve-icon
http://www.zerodayinitiative.com/advisories/ZDI-16-256 cve-icon cve-icon
http://www.zerodayinitiative.com/advisories/ZDI-16-257 cve-icon cve-icon
http://www.zerodayinitiative.com/advisories/ZDI-16-258 cve-icon cve-icon
http://www.zerodayinitiative.com/advisories/ZDI-16-259 cve-icon cve-icon
http://www.zerodayinitiative.com/advisories/ZDI-16-260 cve-icon cve-icon
http://www.zerodayinitiative.com/advisories/ZDI-16-261 cve-icon cve-icon
http://www.zerodayinitiative.com/advisories/ZDI-16-262 cve-icon cve-icon
http://www.zerodayinitiative.com/advisories/ZDI-16-263 cve-icon cve-icon
http://www.zerodayinitiative.com/advisories/ZDI-16-264 cve-icon cve-icon
http://www.zerodayinitiative.com/advisories/ZDI-16-265 cve-icon cve-icon
http://www.zerodayinitiative.com/advisories/ZDI-16-266 cve-icon cve-icon
http://www.zerodayinitiative.com/advisories/ZDI-16-267 cve-icon cve-icon
http://www.zerodayinitiative.com/advisories/ZDI-16-268 cve-icon cve-icon
http://www.zerodayinitiative.com/advisories/ZDI-16-269 cve-icon cve-icon
http://www.zerodayinitiative.com/advisories/ZDI-16-270 cve-icon cve-icon
http://www.zerodayinitiative.com/advisories/ZDI-16-271 cve-icon cve-icon
http://www.zerodayinitiative.com/advisories/ZDI-16-272 cve-icon cve-icon
History

No history.

cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2024-08-06T00:25:14.518Z

Reserved: 2016-04-29T00:00:00

Link: CVE-2016-4350

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Deferred

Published: 2016-05-09T20:59:04.790

Modified: 2025-04-12T10:46:40.837

Link: CVE-2016-4350

cve-icon Redhat

No data.