Description
In SolarWinds Serv-U before 15.2.2 Hotfix 1, there is a directory containing user profile files (that include users' password hashes) that is world readable and writable. An unprivileged Windows user (having access to the server's filesystem) can add an FTP user by copying a valid profile file to this directory. For example, if this profile sets up a user with a C:\ home directory, then the attacker obtains access to read or replace arbitrary files with LocalSystem privileges.
References (1)
Core 1
Core References
Exploit, Third Party Advisory x_refsource_misc
https://www.trustwave.com/en-us/resources/blogs/spiderlabs-blog/full-system-control-with-new-solarwinds-orion-based-and-serv-u-ftp-vulnerabilities/
Scores
CVSS v3
7.1
EPSS
0.0040
EPSS Percentile
61.1%
Attack Vector
LOCAL
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N
Details
CWE
CWE-732
Status
published
Products (2)
solarwinds/serv-u
15.2.2
solarwinds/serv-u
< 15.2.2
Published
Feb 03, 2021
Tracked Since
Feb 18, 2026