CVE-2021-25276
Summary
| CVE | CVE-2021-25276 |
|---|---|
| State | PUBLIC |
| Assigner | [email protected] |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2021-02-03 17:15:00 UTC |
| Updated | 2022-07-12 17:42:00 UTC |
| Description | In SolarWinds Serv-U before 15.2.2 Hotfix 1, there is a directory containing user profile files (that include users' password hashes) that is world readable and writable. An unprivileged Windows user (having access to the server's filesystem) can add an FTP user by copying a valid profile file to this directory. For example, if this profile sets up a user with a C:\ home directory, then the attacker obtains access to read or replace arbitrary files with LocalSystem privileges. |
Risk And Classification
Problem Types: CWE-732
NVD Known Affected Configurations (CPE 2.3)
| Type | Vendor | Product | Version | Update | Edition | Language |
|---|---|---|---|---|---|---|
| Application | Solarwinds | Serv-u | All | All | All | All |
| Application | Solarwinds | Serv-u | 15.2.2 | - | All | All |
| Application | Solarwinds | Serv-u | All | All | All | All |
| Application | Solarwinds | Serv-u | 15.2.2 | - | All | All |
References
| Reference | Source | Link | Tags |
|---|---|---|---|
| Full System Control with New SolarWinds Orion-based and Serv-U FTP Vulnerabilities | Trustwave | MISC | www.trustwave.com | Exploit, Third Party Advisory |
| CVE Program record | CVE.ORG | www.cve.org | canonical |
| NVD vulnerability detail | NVD | nvd.nist.gov | canonical, analysis |
No vendor comments have been submitted for this CVE.
There are currently no legacy QID mappings associated with this CVE.