POC详情: ccec7271e303db6ad8d785158b99967ed2e52c20

来源
关联漏洞
标题: SolarWinds Serv-U 路径遍历漏洞 (CVE-2024-28995)
描述:SolarWinds Serv-U File Server是美国SolarWinds公司的一款文件传输服务器。 SolarWinds Serv-U存在路径遍历漏洞,该漏洞源于容易受到目录横向的影响,允许访问读取主机上的敏感文件。
介绍
# CVE-2024-28995 Automated Path Traversal & Local File Read

## Features

- **Version Detection**: Retrieves the Serv-U version from the server header.
- **Vulnerability Check**: Compares the detected version against a known vulnerable version (`15.4.2` or lower).
- **Default Path Testing**: Tests predefined paths for both Windows and Linux to determine if the server is vulnerable.
- **Custom Path Testing**: Allows users to specify custom directory and file paths to test for file read vulnerability.
- **Wordlist Path Testing**: Supports the use of a wordlist for testing multiple paths for file read vulnerability.

## Usage

To use this tool, you need to have Python installed. Run the script with the appropriate arguments:

```sh
python3 CVE-2024-28995.py -u <URL> [-d <Directory Path>] [-f <File Name>] [-w <Wordlist>]
```

## Arguments

    -u, --url: URL to exploit (required).
    -d, --dir: Directory path for File Read (e.g., ProgramData/RhinoSoft/Serv-U/).
    -f, --file: File to read for File Read (e.g., Serv-U-StartupLog.txt or passwd).
    -w, --wordlist: Wordlist for additional paths to test.

Example

```sh
python3 CVE-2024-28995.py -u http://example.com -d ProgramData/RhinoSoft/Serv-U/ -f Serv-U-StartupLog.txt
```

![image](https://github.com/Stuub/CVE-2024-28995/assets/60468836/609935ce-efd4-4263-9911-054fe1f5f83a)

![image](https://github.com/Stuub/CVE-2024-28995/assets/60468836/cbe8d8bf-bb2e-4db9-9d46-5dcc3a8d635a)

![image](https://github.com/Stuub/CVE-2024-28995/assets/60468836/d3536c03-048f-4d91-a020-087822ebf5c7)


References

https://www.labs.greynoise.io/grimoire/2024-06-solarwinds-serv-u/

https://github.com/bigb0x/CVE-2024-28995
文件快照

[4.0K] /data/pocs/ccec7271e303db6ad8d785158b99967ed2e52c20 ├── [6.4K] CVE-2024-28995.py └── [1.6K] README.md 0 directories, 2 files
神龙机器人已为您缓存
备注
    1. 建议优先通过来源进行访问。
    2. 如果因为来源失效或无法访问,请发送邮箱到 f.jinxu#gmail.com 索取本地快照(把 # 换成 @)。
    3. 神龙已为您对POC代码进行快照,为了长期维护,请考虑为本地POC付费,感谢您的支持。