vulnerability
SolarWinds Serv-U FTP Server, Windows "Users" directory weak ACLs (CVE-2021-25276)
Severity | CVSS | Published | Added | Modified |
---|---|---|---|---|
4 | (AV:L/AC:L/Au:N/C:P/I:P/A:N) | 02/03/2021 | 02/05/2021 | 02/12/2021 |
Severity
4
CVSS
(AV:L/AC:L/Au:N/C:P/I:P/A:N)
Published
02/03/2021
Added
02/05/2021
Modified
02/12/2021
Description
In SolarWinds Serv-U before 15.2.2 Hotfix 1, there is a directory containing user profile files (that include users' password hashes) that is world readable and writable. An unprivileged Windows user (having access to the server's filesystem) can add an FTP user by copying a valid profile file to this directory. For example, if this profile sets up a user with a C:\ home directory, then the attacker obtains access to read or replace arbitrary files with LocalSystem privileges.
Solution
solarwinds-serv-u-ftp-server-upgrade-latest
References
- CVE-2021-25276
- https://attackerkb.com/topics/CVE-2021-25276
- URL-https://support.solarwinds.com/SuccessCenter/s/article/Serv-U-15-2-2-HotFix-1?language=en_US
- URL-https://www.trustwave.com/en-us/resources/blogs/spiderlabs-blog/full-system-control-with-new-solarwinds-orion-based-and-serv-u-ftp-vulnerabilities/
- URL-https://www.trustwave.com/en-us/resources/security-resources/security-advisories/?fid=28396

NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.