SolarWinds Serv-U is vulnerable to a directory traversal vulnerability where remote code execution is possible depending on privileges given to the authenticated user. This issue requires a user to be authenticated and this is present when software environment variables are abused. Authentication is required for this vulnerability
References
Link | Resource |
---|---|
https://www.solarwinds.com/trust-center/security-advisories/CVE-2024-45711 | Vendor Advisory |
Configurations
History
17 Oct 2024, 20:17
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:a:solarwinds:serv-u:*:*:*:*:*:*:*:* | |
First Time |
Solarwinds serv-u
Solarwinds |
|
References | () https://www.solarwinds.com/trust-center/security-advisories/CVE-2024-45711 - Vendor Advisory | |
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 8.8 |
16 Oct 2024, 16:38
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
16 Oct 2024, 08:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-10-16 08:15
Updated : 2024-10-17 20:17
NVD link : CVE-2024-45711
Mitre link : CVE-2024-45711
CVE.ORG link : CVE-2024-45711
JSON object : View
Products Affected
solarwinds
- serv-u
CWE
CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')