Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2024-28995 PoC — SolarWinds Serv-U 路径遍历漏洞

Source
Associated Vulnerability
Title:SolarWinds Serv-U 路径遍历漏洞 (CVE-2024-28995)
Description:SolarWinds Serv-U File Server是美国SolarWinds公司的一款文件传输服务器。 SolarWinds Serv-U存在路径遍历漏洞,该漏洞源于容易受到目录横向的影响,允许访问读取主机上的敏感文件。
Description
SolarWinds Serv-U Directory Traversal Vulnerability (CVE-2024-28995) POC
Readme
## SolarWinds Serv-U Directory Traversal Vulnerability POC

```
cat targets.txt | nuclei -duc -t CVE-2024-28995.yaml 
```
![image](https://github.com/karkis3c/cves/assets/155802810/b90f2020-7c13-4e2f-a755-7efd19a023ef)

## Analysis 
https://t.co/JPCd6Y4v1g

## Shodan Querys

```product:"Rhinosoft Serv-U httpd,rhinosoft serv-u httpd"```

```http.favicon.hash:"812385209,-494622145,-132641984,-2076792107,-1735578509,-938894035,-741511745,-1109617687,963790560,-1882082933"```

```title:"Serv-U"```

## Affected Products
SolarWinds Serv-U 15.4.2 HF 1 and previous versions
File Snapshot

[4.0K] /data/pocs/bfc8f7ed099a6b45505e988cec2ea8d806b929a6 ├── [1.8K] CVE-2024-28995.yaml ├── [ 573] README.md └── [ 560] serv-u-version-detect.yaml 0 directories, 3 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.