Serv-U FTP Server < 15.2.2 Hotfix 1 Arbitrary File Read/Write

high Nessus Plugin ID 146308

Synopsis

The remote FTP server is affected by an Arbitrary File Read/Write vulnerability.

Description

In SolarWinds Serv-U before 15.2.2 Hotfix 1, there is a directory containing user profile files (that include users' password hashes) that is world readable and writable. An unprivileged Windows user (having access to the server's filesystem) can add an FTP user by copying a valid profile file to this directory. For example, if this profile sets up a user with a C:\ home directory, then the attacker obtains access to read or replace arbitrary files with LocalSystem privileges.

Note that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number.

Solution

Upgrade to ServU-FTP 15.2.2 Hotfix 1 or later.

See Also

http://www.nessus.org/u?0c04a9b0

http://www.nessus.org/u?26d4bf3d

Plugin Details

Severity: High

ID: 146308

File Name: servu_15_2_2_1.nasl

Version: 1.4

Type: remote

Family: FTP

Published: 2/9/2021

Updated: 1/22/2024

Configuration: Enable thorough checks

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 6.0

CVSS v2

Risk Factor: Low

Base Score: 3.6

Temporal Score: 2.8

Vector: CVSS2#AV:L/AC:L/Au:N/C:P/I:P/A:N

CVSS Score Source: CVE-2021-25276

CVSS v3

Risk Factor: High

Base Score: 7.1

Temporal Score: 6.4

Vector: CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N

Temporal Vector: CVSS:3.0/E:P/RL:O/RC:C

Vulnerability Information

CPE: cpe:/a:solarwinds:serv-u_file_server

Required KB Items: installed_sw/Serv-U, Host/OS

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 2/1/2021

Vulnerability Publication Date: 2/3/2021

Reference Information

CVE: CVE-2021-25276