Skip to content

Exploit for CVE-2024-28995 affecting SolarWinds Serv-U 15.4.2 HF 1 and previous versions

Notifications You must be signed in to change notification settings

Praison001/CVE-2024-28995-SolarWinds-Serv-U

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

8 Commits
 
 
 
 

Repository files navigation

CVE-2024-28995-SolarWinds-Serv-U

SolarWinds Serv-U File Server (Serv-U) is a multi-protocol file server capable of sending and receiving files from other networked computers through various means.

CVE-2024-28995 is an unauthenticated directory transversal vulnerability in SolarWinds Serv-U that would allow an attacker to read sensitive files on the target machine.

Affected product and versions: SolarWinds Serv-U 15.4.2 HF 1 and previous versions

Shodan product:"Rhinosoft Serv-U httpd,rhinosoft serv-u httpd"

Usage: python3 exploit.py -u targetURL

Usage example: python3 exploit.py -u https://127.0.0.1/

Disclaimer: This exploit is to be used only for educational and authorized testing purposes. Illegal/unauthorized use of this exploit is prohibited. I am not responsible for any misuse or damage caused by this script.

References: https://www.labs.greynoise.io/grimoire/2024-06-solarwinds-serv-u/?_ga=2.40268130.1338594016.1719161976-20097766.1719161973

https://attackerkb.com/topics/2k7UrkHyl3/cve-2024-28995/rapid7-analysis

About

Exploit for CVE-2024-28995 affecting SolarWinds Serv-U 15.4.2 HF 1 and previous versions

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Languages