CVE-2024-28995

HIGH KEV NUCLEI

SolarWinds Serv-U - Directory Traversal

Title source: nuclei

Description

SolarWinds Serv-U was susceptible to a directory transversal vulnerability that would allow access to read sensitive files on the host machine.

Exploits (14)

exploitdb WORKING POC
by İbrahimsql · pythonremotemultiple
https://www.exploit-db.com/exploits/52311
nomisec WORKING POC 34 stars
by Stuub · infoleak
https://github.com/Stuub/CVE-2024-28995
nomisec SCANNER 13 stars
by bigb0x · infoleak
https://github.com/bigb0x/CVE-2024-28995
nomisec WORKING POC 4 stars
by ibrahmsql · infoleak
https://github.com/ibrahmsql/CVE-2024-28995
nomisec WORKING POC 3 stars
by gotr00t0day · infoleak
https://github.com/gotr00t0day/CVE-2024-28995
nomisec WORKING POC 2 stars
by 0xc4t · infoleak
https://github.com/0xc4t/CVE-2024-28995
nomisec SCANNER 2 stars
by ggfzx · poc
https://github.com/ggfzx/CVE-2024-28995
nomisec WORKING POC 1 stars
by Praison001 · infoleak
https://github.com/Praison001/CVE-2024-28995-SolarWinds-Serv-U
nomisec SCANNER 1 stars
by huseyinstif · infoleak
https://github.com/huseyinstif/CVE-2024-28995-Nuclei-Template
nomisec SCANNER
by muhammetali20 · infoleak
https://github.com/muhammetali20/CVE-2024-28995
nomisec SCANNER
by demoAlitalia · poc
https://github.com/demoAlitalia/CVE-2024-28995
metasploit WORKING POC
by sfewer-r7, Hussein Daher · rubypoc
https://github.com/rapid7/metasploit-framework/blob/master/modules/auxiliary/gather/solarwinds_servu_fileread_cve_2024_28995.rb

Nuclei Templates (1)

SolarWinds Serv-U - Directory Traversal
HIGHVERIFIEDby DhiyaneshDK
Shodan: html:"Serv-U"
FOFA: server="Serv-U"

Scores

CVSS v3 8.6
EPSS 0.9443
EPSS Percentile 100.0%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N

Details

CISA KEV 2024-07-17
VulnCheck KEV 2024-06-21
InTheWild.io 2024-07-17
ENISA EUVD EUVD-2024-26057
CWE
CWE-22
Status published
Products (2)
solarwinds/serv-u 15.4.2 (2 CPE variants)
solarwinds/serv-u < 15.4.2
Published Jun 06, 2024
KEV Added Jul 17, 2024
Tracked Since Feb 18, 2026