VID |
16157 |
Severity |
40 |
Port |
21 |
Protocol |
TCP |
Class |
FTP |
Detailed Description |
The version of SolarWinds Serv-U installed on the remote host is prior to 15.5 / 15.5. It is, therefore, affected by multiple vulnerabilities as referenced in the serv-u_15_5 advisory.
- SolarWinds Serv-U is vulnerable to a directory traversal vulnerability where remote code execution is possible depending on privileges given to the authenticated user. This issue requires a user to be authenticated and this is present when software environment variables are abused. Authentication is required for this vulnerability (CVE-2024-45711) - Application is vulnerable to Cross Site Scripting (XSS) an authenticated attacker with users' permissions can modify a variable with a payload. (CVE-2024-45714)
* References: https://www.solarwinds.com/trust-center/security-advisories/cve-2024-45711 https://www.solarwinds.com/trust-center/security-advisories/cve-2024-45714
* Platforms Affected: Rhino Software, Inc., Serv-U FTP Server 15.5 prior Microsoft Windows Any version |
Recommendation |
Upgrade to latest version of Serv-U (15.5 or later), available from Serv-U Web site at http://www.serv-u.com/ |
Related URL |
CVE-2024-45711,CVE-2024-45714 (CVE) |
Related URL |
(SecurityFocus) |
Related URL |
(ISS) |
|