{"api_version":"1","generated_at":"2026-04-25T22:06:34+00:00","cve":"CVE-2021-35247","urls":{"html":"https://cve.report/CVE-2021-35247","api":"https://cve.report/api/cve/CVE-2021-35247.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2021-35247","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2021-35247"},"summary":{"title":"CVE-2021-35247","description":"Serv-U web login screen to LDAP authentication was allowing characters that were not sufficiently sanitized. SolarWinds has updated the input mechanism to perform additional validation and sanitization. Please Note: No downstream affect has been detected as the LDAP servers ignored improper characters. To insure proper input validation is completed in all environments. SolarWinds recommends scheduling an update to the latest version of Serv-U.","state":"PUBLIC","assigner":"psirt@solarwinds.com","published_at":"2022-01-10 14:10:00","updated_at":"2022-02-10 15:08:00"},"problem_types":["CWE-20"],"metrics":[],"references":[{"url":"https://documentation.solarwinds.com/en/success_center/servu/content/release_notes/servu_15-3_release_notes.htm","name":"https://documentation.solarwinds.com/en/success_center/servu/content/release_notes/servu_15-3_release_notes.htm","refsource":"MISC","tags":[],"title":"Serv-U File Server 15.3 Release Notes","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://www.solarwinds.com/trust-center/security-advisories/cve-2021-35247","name":"https://www.solarwinds.com/trust-center/security-advisories/cve-2021-35247","refsource":"MISC","tags":[],"title":"Page Not Found.","mime":"text/html","httpstatus":"404","archivestatus":"404"},{"url":"https://www.cve.org/CVERecord?id=CVE-2021-35247","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2021-35247","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[{"source":"LEGACY","value":"SolarWinds would like to thank Jonathan Bar Or of Microsoft (@yo_yo_yo_jbo) for reporting this vulnerability","lang":""}],"nvd_cpes":[{"cve_year":"2021","cve_id":"35247","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"solarwinds","cpe5":"serv-u","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2021","cve_id":"35247","vulnerable":"1","versionEndIncluding":"15.2.5","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"solarwinds","cpe5":"serv-u","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"}],"vendor_comments":[],"enrichments":{"kev":{"cve_year":"2021","cve_id":"35247","cve":"CVE-2021-35247","vendorProject":"SolarWinds","product":"Serv-U","vulnerabilityName":"SolarWinds Serv-U Improper Input Validation Vulnerability","dateAdded":"2022-01-21","shortDescription":"SolarWinds Serv-U versions 15.2.5 and earlier contain an improper input validation vulnerability that allows attackers to build and send queries without sanitization.","requiredAction":"Apply updates per vendor instructions.","dueDate":"2022-02-04","knownRansomwareCampaignUse":"Unknown","notes":"https://nvd.nist.gov/vuln/detail/CVE-2021-35247","cwes":"CWE-20","catalogVersion":"2026.04.24","updated_at":"2026-04-24 17:59:34"},"epss":{"cve_year":"2021","cve_id":"35247","cve":"CVE-2021-35247","epss":"0.053450000","percentile":"0.901020000","score_date":"2026-04-24","updated_at":"2026-04-25 00:14:37"},"legacy_qids":[{"cve":"CVE-2021-35247","qid":"376260","title":"SolarWinds Serv-U Improper Input Validation Vulnerability"}]},"source_records":{"cve_program":{"CVE_data_meta":{"ASSIGNER":"psirt@solarwinds.com","DATE_PUBLIC":"2022-01-05T09:21:00.000Z","ID":"CVE-2021-35247","STATE":"PUBLIC","TITLE":"Improper Input Validation Vulnerability in Serv-U "},"affects":{"vendor":{"vendor_data":[{"product":{"product_data":[{"product_name":"Serv-U","version":{"version_data":[{"version_affected":"<","version_name":"15.2.5 and previous versions ","version_value":"15.3"}]}}]},"vendor_name":"SolarWinds"}]}},"credit":[{"lang":"eng","value":"SolarWinds would like to thank Jonathan Bar Or of Microsoft (@yo_yo_yo_jbo) for reporting this vulnerability "}],"data_format":"MITRE","data_type":"CVE","data_version":"4.0","description":{"description_data":[{"lang":"eng","value":"Serv-U web login screen to LDAP authentication was allowing characters that were not sufficiently sanitized. SolarWinds has updated the input mechanism to perform additional validation and sanitization. Please Note: No downstream affect has been detected as the LDAP servers ignored improper characters. To insure proper input validation is completed in all environments. SolarWinds recommends scheduling an update to the latest version of Serv-U."}]},"generator":{"engine":"Vulnogram 0.0.9"},"impact":{"cvss":{"attackComplexity":"LOW","attackVector":"NETWORK","availabilityImpact":"NONE","baseScore":4.3,"baseSeverity":"MEDIUM","confidentialityImpact":"NONE","integrityImpact":"LOW","privilegesRequired":"NONE","scope":"UNCHANGED","userInteraction":"REQUIRED","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N","version":"3.1"}},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"CWE-20 Improper Input Validation"}]}]},"references":{"reference_data":[{"refsource":"MISC","url":"https://www.solarwinds.com/trust-center/security-advisories/cve-2021-35247","name":"https://www.solarwinds.com/trust-center/security-advisories/cve-2021-35247"},{"refsource":"MISC","url":"https://documentation.solarwinds.com/en/success_center/servu/content/release_notes/servu_15-3_release_notes.htm","name":"https://documentation.solarwinds.com/en/success_center/servu/content/release_notes/servu_15-3_release_notes.htm"}]},"source":{"defect":["CVE-2021-35247"],"discovery":"UNKNOWN"}},"nvd":{"publishedDate":"2022-01-10 14:10:00","lastModifiedDate":"2022-02-10 15:08:00","problem_types":["CWE-20"],"metrics":{"baseMetricV3":{"cvssV3":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"LOW","availabilityImpact":"NONE","baseScore":5.3,"baseSeverity":"MEDIUM"},"exploitabilityScore":3.9,"impactScore":1.4},"baseMetricV2":{"cvssV2":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:N/I:P/A:N","accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"PARTIAL","availabilityImpact":"NONE","baseScore":5},"severity":"MEDIUM","exploitabilityScore":10,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}},"configurations":{"CVE_data_version":"4.0","nodes":[{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:solarwinds:serv-u:*:*:*:*:*:*:*:*","versionEndExcluding":"15.3","cpe_name":[]}]}]}},"legacy_mitre":{"record":{"CveYear":"2021","CveId":"35247","Ordinal":"210738","Title":"CVE-2021-35247","CVE":"CVE-2021-35247","Year":"2021"},"notes":[{"CveYear":"2021","CveId":"35247","Ordinal":"1","NoteData":"Serv-U web login screen to LDAP authentication was allowing characters that were not sufficiently sanitized. SolarWinds has updated the input mechanism to perform additional validation and sanitization. Please Note: No downstream affect has been detected as the LDAP servers ignored improper characters. To insure proper input validation is completed in all environments. SolarWinds recommends scheduling an update to the latest version of Serv-U.","Type":"Description","Title":null},{"CveYear":"2021","CveId":"35247","Ordinal":"2","NoteData":"2022-01-07","Type":"Other","Title":"Published"},{"CveYear":"2021","CveId":"35247","Ordinal":"3","NoteData":"2022-01-25","Type":"Other","Title":"Modified"}]}}}