Rapid7 Vulnerability & Exploit Database

SolarWinds Serv-U FTP Server, Windows "Users" directory weak ACLs (CVE-2021-25276)

Free InsightVM Trial No Credit Card Necessary
Watch Demo See how it all works
Back to Search

SolarWinds Serv-U FTP Server, Windows "Users" directory weak ACLs (CVE-2021-25276)

Severity
4
CVSS
(AV:L/AC:L/Au:N/C:P/I:P/A:N)
Published
02/03/2021
Created
02/09/2021
Added
02/05/2021
Modified
02/12/2021

Description

In SolarWinds Serv-U before 15.2.2 Hotfix 1, there is a directory containing user profile files (that include users' password hashes) that is world readable and writable. An unprivileged Windows user (having access to the server's filesystem) can add an FTP user by copying a valid profile file to this directory. For example, if this profile sets up a user with a C:\ home directory, then the attacker obtains access to read or replace arbitrary files with LocalSystem privileges.

Solution(s)

  • solarwinds-serv-u-ftp-server-upgrade-latest

With Rapid7 live dashboards, I have a clear view of all the assets on my network, which ones can be exploited, and what I need to do in order to reduce the risk in my environment in real-time. No other tool gives us that kind of value and insight.

– Scott Cheney, Manager of Information Security, Sierra View Medical Center

;