Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2021-35250 PoC — SolarWinds Serv-U FTP Server 路径遍历漏洞

Source
Associated Vulnerability
Title:SolarWinds Serv-U FTP Server 路径遍历漏洞 (CVE-2021-35250)
Description:SolarWinds Serv-U FTP Server是美国SolarWinds公司的一套FTP和MFT文件传输软件。 SolarWinds Serv-U FTP Server 中存在路径遍历漏洞。该漏洞源于网络系统或产品未能正确地过滤资源或文件路径中的特殊元素。攻击者可利用该漏洞访问受限目录之外的位置。
Readme

# SolarWinds-CVE-2021-35250
![solarwinds-inc-logo835x396-702x336](https://user-images.githubusercontent.com/37665001/231947256-789b2a70-cba1-45d1-85db-27e07efe68c8.jpg)
### Serv-U [v.15.3.0.X] CVE-2021-35250-Directory-Traversal 
Hello everyone

This is my first POC, don't judge strictly.

### **Disclaimer**
The author of this repository is not responsible for any damage caused by the use or misuse of these PoC exploits. These PoCs are intended for educational and research purposes only, and should never be used to target or exploit systems without explicit permission from the owner.

### Description
I work for the "R-X Team". During penetration testing, I came across Serv-U. I started looking for known vulnerabilities, and I was interested in CVE-2020-27994. But it was closed by an update in version 15.2.2, and I was working with Serv-U version 15.3.0. "I decided to dig deeper and modify the payload in various ways, as well as modify the HTTP request itself, after much agony I managed to reproduce the vulnerability of directory traversal" :)

 The vulnerability allows a remote user to perform directory traversal attacks by sending a specially crafted HTTP request and reading arbitrary files in the system.
Reading files is only possible on the C:
\ drive, an attacker can get information on the file server only by knowing the path to the files. There are 3 known options for which files and how an attacker can read:
- Default Windows files. Example: "C:\Windows\win.ini ";
- Brute force file detection;
- Determination of file paths in default Windows files or used software on the server.

POC:


![Serv-U](https://user-images.githubusercontent.com/37665001/231661246-19fdf7a2-326c-4226-af72-f82af36bbbf4.png)
![Serv-U1](https://user-images.githubusercontent.com/37665001/231953431-95dd3276-6c77-4b2f-9ebe-d63bfedad37f.png)

### **Recommendations:**
https://nvd.nist.gov/vuln/detail/CVE-2021-35250

https://support.solarwinds.com/SuccessCenter/s/article/Serv-U-15-3-HotFix-1?language=en_US

https://www.solarwinds.com/trust-center/security-advisories/cve-2021-35250




File Snapshot

[4.0K] /data/pocs/00104fd0145b16429ebad5614b6821105348fbc2 └── [2.0K] README.md 0 directories, 1 file
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.