漏洞信息详情
SolarWinds Serv-U 操作系统命令注入漏洞
漏洞简介
SolarWinds Serv-U中存在操作系统命令注入漏洞。该漏洞源于外部输入数据构造操作系统可执行命令过程中,网络系统或产品未正确过滤其中的特殊字符、命令等。攻击者可利用该漏洞执行非法操作系统命令。
漏洞公告
目前厂商已发布升级补丁以修复漏洞,补丁获取链接:
https://documentation.solarwinds.com/en/success_center/servu/Content/Release_Notes/Servu_15-1-7_release_notes.htm
参考网址
来源:CONFIRM
链接:https://support.solarwinds.com/SuccessCenter/s/article/Serv-U-Potential-elevation-of-privileges-on-Linux-systems
来源:documentation.solarwinds.com
链接:https://documentation.solarwinds.com/en/success_center/servu/Content/Release_Notes/Servu_15-1-7_release_notes.htm
来源:MISC
链接:https://blog.vastart.dev/2019/06/cve-2019-12181-serv-u-exploit-writeup.html
来源:MISC
链接:http://packetstormsecurity.com/files/153333/Serv-U-FTP-Server-15.1.6-Privilege-Escalation.html
来源:www.exploit-db.com
链接:https://www.exploit-db.com/exploits/47072
来源:www.exploit-db.com
链接:https://www.exploit-db.com/exploits/47173
来源:nvd.nist.gov
链接:https://nvd.nist.gov/vuln/detail/CVE-2019-12181
来源:packetstormsecurity.com
链接:https://packetstormsecurity.com/files/153333/Serv-U-FTP-Server-15.1.6-Privilege-Escalation.html
来源:www.exploit-db.com
链接:https://www.exploit-db.com/exploits/47009
来源:packetstormsecurity.com
链接:https://packetstormsecurity.com/files/153505/Serv-U-FTP-Server-prepareinstallation-Privilege-Escalation.html
受影响实体
暂无
补丁
- SolarWinds Serv-U 安全漏洞的修复措施<!--2019-6-17-->
还没有评论,来说两句吧...