By using this site, you agree to the Privacy Policy and Terms of Use.
Accept
Viral Trending contentViral Trending content
  • Home
  • World News
  • Politics
  • Sports
  • Celebrity
  • Business
  • Crypto
  • Gaming News
  • Tech News
  • Travel
Reading: SolarWinds Serv-U path-traversal flaw actively exploited in attacks
Notification Show More
Viral Trending contentViral Trending content
  • Home
  • Categories
    • World News
    • Politics
    • Sports
    • Celebrity
    • Business
    • Crypto
    • Tech News
    • Gaming News
    • Travel
  • Bookmarks
© 2024 All Rights reserved | Powered by Viraltrendingcontent
Viral Trending content > Blog > Tech News > SolarWinds Serv-U path-traversal flaw actively exploited in attacks
Tech News

SolarWinds Serv-U path-traversal flaw actively exploited in attacks

By admin 4 Min Read
Share
SHARE

Contents
The CVE-2024-28995 flawPublic exploits available

Threat actors are actively exploiting a SolarWinds Serv-U path-traversal vulnerability, leveraging publicly available proof-of-concept (PoC) exploits.

Although the attacks do not appear particularly sophisticated, the observed activity underscores the risk posed by unpatched endpoints, emphasizing the urgent need for administrators to apply the security updates.

The CVE-2024-28995 flaw

The vulnerability, CVE-2024-28995, is a high-severity directory traversal flaw, allowing unauthenticated attackers to read arbitrary files from the filesystem by crafting specific HTTP GET requests.

The vulnerability arises from insufficient validation of path traversal sequences, enabling attackers to bypass security checks and access sensitive files.

The flaw impacts the following SolarWinds products:

  • Serv-U FTP Server 15.4
  • Serv-U Gateway 15.4
  • Serv-U MFT Server 15.4
  • Serv-U File Server 15.4.2.126 and earlier

Older versions (15.3.2 and earlier) are also affected but will reach the end of life in February 2025 and are already unsupported.

Exploiting the flaw may expose sensitive data from unauthorized file access, potentially leading to extended compromise.

SolarWinds released the 15.4.2 Hotfix 2, version 15.4.2.157, on June 5, 2024, to address this vulnerability by introducing improved validation mechanisms.

Public exploits available

Over the weekend, Rapid7 analysts published a technical write-up that provided detailed steps to exploit the directory traversal vulnerability in SolarWinds Serv-U to read arbitrary files from the affected system.

A day later, an independent Indian researcher released a PoC exploit and a bulk scanner for CVE-2024-28995 on GitHub.

On Monday, Rapid7 warned about how trivial the flaw is to exploit, estimating the number of internet-exposed and potentially vulnerable instances between 5,500 and 9,500.

Curl command PoC
<strong>Curl command PoC</strong><br /><em>Source: Rapid7</em>

GreyNoise set up a honeypot that mimics a vulnerable Serv-U system to monitor and analyze exploitation attempts for CVE-2024-28995.

The analysts observed various attack strategies, including hands-on keyboard actions indicating manual attempts to exploit the vulnerability, as well as automated attempts.

Attackers use platform-specific path traversal sequences, bypassing security checks using incorrect slashes, which the Serv-U system later corrects, allowing unauthorized file access.

Typical payloads on Windows are ‘GET /?InternalDir=/../../../../windows&InternalFile=win.ini’ and on Linux it’s ‘GET /?InternalDir=........etc&InternalFile=passwd.’

Exploitation attempts on Windows and Linux
<strong>Exploitation attempts on Windows and Linux</strong><br /><em>Source: GreyNoise</em>

The most frequently targeted files seen by Greynoise are:

  • etc/passwd (contains user account data on Linux)
  • /ProgramData/RhinoSoft/Serv-U/Serv-U-StartupLog.txt (contains startup logs info for the Serv-U FTP server)
  • /windows/win.ini (initialization file containing Windows configuration settings)

Attackers target those files to escalate their privileges or explore secondary opportunities in the breached network.

GreyNoise reports cases where the attackers appear to copy-paste exploits without testing, resulting in failed attempts.

In other exploitation attempts from China, the attackers showcase persistence, adaptability, and better understanding. 

GreyNoise says they experimented with different payloads and formats for four hours and adjusted their approach based on server responses.

With confirmed attacks underway, system administrators must apply the available fixes as soon as possible.

You Might Also Like

Trump Phone T1 Launches in US: Design, Features, Background

AGIBOT A2 Brings Embodied AI to the Met Gala Alongside Alexander Wang

CISA flags Windows Task Host vulnerability as exploited in attacks

Anthropic sets sights on small business after enterprise push

Sony Xperia 1 VIII AI Camera Assistant Internet Outrage

TAGGED: Actively Exploited, Honeypot, Path Traversal, solarwinds, Vulnerability
Share This Article
Facebook Twitter Copy Link
Previous Article Putin signs deals with Vietnam in bid to shore up ties in Asia to offset Moscow’s growing isolation
Next Article Far-Right Militias Are Back | WIRED
Leave a comment

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

- Advertisement -
Ad image

Latest News

$10M Gone: Thorchain Exploit Triggers Security Fears Across DeFi
Crypto
Scientists spot ‘yellow brick road’ deep under the ocean and the explanation is even more surprising
World News
Trump Phone T1 Launches in US: Design, Features, Background
Tech News
Oil tanker arrives in South Korea after leaving the Strait of Hormuz
Business
US, Iran no closer to ending war as Qatari tanker sails toward Strait of Hormuz
Business
US CLARITY Act will be a ‘boon for domestic innovation’: A16z
Crypto
AGIBOT A2 Brings Embodied AI to the Met Gala Alongside Alexander Wang
Tech News

About Us

Welcome to Viraltrendingcontent, your go-to source for the latest updates on world news, politics, sports, celebrity, tech, travel, gaming, crypto news, and business news. We are dedicated to providing you with accurate, timely, and engaging content from around the globe.

Quick Links

  • Home
  • World News
  • Politics
  • Celebrity
  • Business
  • Home
  • World News
  • Politics
  • Sports
  • Celebrity
  • Business
  • Crypto
  • Gaming News
  • Tech News
  • Travel
  • Sports
  • Crypto
  • Tech News
  • Gaming News
  • Travel

Trending News

cageside seats

Unlocking the Ultimate WWE Experience: Cageside Seats News 2024

Trump Phone T1 Launches in US: Design, Features, Background

Investing £5 a day could help me build a second income of £329 a month!

cageside seats
Unlocking the Ultimate WWE Experience: Cageside Seats News 2024
May 22, 2024
Trump Phone T1 Launches in US: Design, Features, Background
May 17, 2026
Investing £5 a day could help me build a second income of £329 a month!
March 27, 2024
Brussels unveils plans for a European Degree but struggles to explain why
March 27, 2024
© 2024 All Rights reserved | Powered by Vraltrendingcontent
  • About Us
  • Contact US
  • Disclaimer
  • Privacy Policy
  • Terms of Service
Welcome Back!

Sign in to your account

Lost your password?