.. / CVE-2021-35250

Exploit for SolarWinds Serv-U 15.3 - Directory Traversal (CVE-2021-35250)

Description:

SolarWinds Serv-U 15.3 is susceptible to local file inclusion, which may allow an attacker access to installation and server files and also make it possible to obtain sensitive information, modify data, and/or execute unauthorized administrative operations in the context of the affected site.

Nuclei Template

View the template here CVE-2021-35250.yaml

Validate with Nuclei

echo "$URL" | nuclei -t ~/nuclei-templates/http/cves/2021/CVE-2021-35250.yaml
Copy

References:

https://twitter.com/shaybt12/status/1646966578695622662?s=43&t=5HOgSFut7Y75N7CBHEikSg
https://github.com/rissor41/SolarWinds-CVE-2021-35250
https://nvd.nist.gov/vuln/detail/CVE-2021-35250
https://support.solarwinds.com/SuccessCenter/s/article/Serv-U-15-3-HotFix-1?language=en_US
https://www.solarwinds.com/trust-center/security-advisories/cve-2021-35250