Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2021-35233— HTTP TRACK & TRACE Methods Enabled

CVSS 5.3 · Medium EPSS 0.99% · P77
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2021-35233

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
HTTP TRACK & TRACE Methods Enabled
Source: NVD (National Vulnerability Database)
Vulnerability Description
The HTTP TRACK & TRACE methods were enabled in Kiwi Syslog Server 9.7.1 and earlier. These methods are intended for diagnostic purposes only. If enabled, the web server will respond to requests that use these methods by returning exact HTTP request that was received in the response to the client. This may lead to the disclosure of sensitive information such as internal authentication headers appended by reverse proxies.
Source: NVD (National Vulnerability Database)
CVSS Information
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
Source: NVD (National Vulnerability Database)
Vulnerability Type
配置
Source: NVD (National Vulnerability Database)
Vulnerability Title
Solarwinds Kiwi Syslog Server 配置错误漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
Solarwinds Kiwi Syslog Server是美国Solarwinds公司的一款适用于网络和系统工程师的经济实惠的 Syslog 管理工具。用于从网络设备(路由器、交换机、防火墙等)和 Linux®/Unix® 主机接收系统日志消息和 Snmp 陷阱。 Solarwinds Kiwi Syslog Server 9.7.1及之前版本存在安全漏洞,该漏洞源于"HTTP TRACK & TRACE"方法会将响应中收到的准确HTTP请求返回给客户端来响应使用这些方法的请求,这可能会导致泄露敏感信息
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Affected Products

VendorProductAffected VersionsCPESubscribe
SolarWindsKiwi Syslog Server 9.7.2 and previous versions ~ 9.8 -

II. Public POCs for CVE-2021-35233

#POC DescriptionSource LinkShenlong Link
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2021-35233

登录查看更多情报信息。

Same Patch Batch · SolarWinds · 2021-10-27 · 3 CVEs total

CVE-2021-352355.3 MEDIUMASP.NET Debug Feature Enabled
CVE-2021-352363.1 LOWMissing Secure Flag From SSL Cookie

IV. Related Vulnerabilities

V. Comments for CVE-2021-35233

No comments yet


Leave a comment