CVE-2021-35243 is a vulnerability in SolarWinds Web Help Desk
Published on December 23, 2021
HTTP PUT & DELETE Methods Enabled
The HTTP PUT and DELETE methods were enabled in the Web Help Desk web server (12.7.7 and earlier), allowing users to execute dangerous HTTP requests. The HTTP PUT method is normally used to upload data that is saved on the server with a user-supplied URL. While the DELETE method requests that the origin server removes the association between the target resource and its current functionality. Improper use of these methods may lead to a loss of integrity.
Vulnerability Analysis
CVE-2021-35243 can be exploited with network access, and does not require authorization privileges or user interaction. This vulnerability is considered to have a low attack complexity. The potential impact of an exploit of this vulnerability is considered to have no impact on confidentiality, with no impact on integrity, and no impact on availability.
Weakness Type
Exposed Dangerous Method or Function
The software provides an Applications Programming Interface (API) or similar interface for interaction with external actors, but the interface includes a dangerous method or function that is not properly restricted.
Products Associated with CVE-2021-35243
You can be notified by email with stack.watch whenever vulnerabilities like CVE-2021-35243 are published in SolarWinds Web Help Desk:
Affected Versions
SolarWinds Web Help Desk Version 12.7.7 and previous versions 12.7.7 HF1 is affected by CVE-2021-35243Exploit Probability
EPSS (Exploit Prediction Scoring System) scores estimate the probability that a vulnerability will be exploited in the wild within the next 30 days. The percentile shows you how this score compares to all other vulnerabilities.