In SolarWinds Serv-U before 15.2.2 Hotfix 1, there is a directory containing user profile files (that include users' password hashes) that is world readable and writable. An unprivileged Windows user (having access to the server's filesystem) can add an FTP user by copying a valid profile file to this directory. For example, if this profile sets up a user with a C:\ home directory, then the attacker obtains access to read or replace arbitrary files with LocalSystem privileges.
References
Link | Resource |
---|---|
https://www.trustwave.com/en-us/resources/blogs/spiderlabs-blog/full-system-control-with-new-solarwinds-orion-based-and-serv-u-ftp-vulnerabilities/ | Exploit Third Party Advisory |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: mitre
Published: 2021-02-03T16:59:55
Updated: 2021-02-03T17:01:17
Reserved: 2021-01-15T00:00:00
Link: CVE-2021-25276
JSON object: View
NVD Information
Status : Analyzed
Published: 2021-02-03T17:15:16.637
Modified: 2022-07-12T17:42:04.277
Link: CVE-2021-25276
JSON object: View
Redhat Information
No data.
CWE