CVE-2023-50395

8.0 HIGH

📋 TL;DR

This SQL injection vulnerability in SolarWinds Platform allows authenticated attackers to execute arbitrary SQL commands via update statements, potentially leading to remote code execution. It affects SolarWinds Platform installations with authenticated user access. The vulnerability requires authentication but can be exploited by any authenticated user.

💻 Affected Systems

Products:
  • SolarWinds Platform
Versions: Versions prior to 2024.1
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: Requires authenticated user access; all default configurations with authentication enabled are vulnerable.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise with administrative access, data exfiltration, lateral movement within the network, and persistent backdoor installation.

🟠

Likely Case

Data theft, privilege escalation, and limited system manipulation by authenticated attackers with basic access.

🟢

If Mitigated

Limited impact with proper input validation, parameterized queries, and least privilege authentication in place.

🌐 Internet-Facing: HIGH
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

SQL injection vulnerabilities are commonly weaponized; authentication requirement reduces but doesn't eliminate risk.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 2024.1 or later

Vendor Advisory: https://www.solarwinds.com/trust-center/security-advisories/CVE-2023-50395

Restart Required: Yes

Instructions:

1. Download SolarWinds Platform 2024.1 or later from SolarWinds customer portal. 2. Backup current configuration and database. 3. Run installer with administrative privileges. 4. Restart SolarWinds services after installation.

🔧 Temporary Workarounds

Input Validation Enhancement

all

Implement additional input validation for all user-supplied data in update statements

Database Permission Reduction

all

Reduce database user permissions to minimum required for application functionality

🧯 If You Can't Patch

  • Implement network segmentation to isolate SolarWinds Platform from critical systems
  • Enforce strict authentication policies and monitor for suspicious authenticated user activity

🔍 How to Verify

Check if Vulnerable:

Check SolarWinds Platform version in web interface under Settings > All Settings > Product Information

Check Version:

Not applicable - check via web interface or SolarWinds Orion Configuration Wizard

Verify Fix Applied:

Verify version is 2024.1 or later and test update functionality with SQL injection test payloads

📡 Detection & Monitoring

Log Indicators:

  • Unusual SQL query patterns in database logs
  • Multiple failed authentication attempts followed by successful login
  • Unexpected update statements in application logs

Network Indicators:

  • Unusual database traffic patterns from SolarWinds servers
  • SQL error messages in HTTP responses

SIEM Query:

source="solarwinds" AND ("sql" OR "update" OR "injection") AND severity>=medium

🔗 References

📤 Share & Export