Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-jqwj-9jvg-583v

Опубликовано: 11 янв. 2022
Источник: github
Github: Не прошло ревью
CVSS3: 5.3

Описание

Serv-U web login screen was allowing characters that were not sanitized by the authentication mechanism. SolarWinds has updated the authentication mechanism to remedy this issue and prevent unauthorized parameters to be used in the Serv-U login screen With the Log4j issue in the wild, input fields across the internet have been tested for vulnerability. Although Serv-U was not affected by the log4j issue, It was discovered that better input validation could be implemented.

Serv-U web login screen was allowing characters that were not sanitized by the authentication mechanism. SolarWinds has updated the authentication mechanism to remedy this issue and prevent unauthorized parameters to be used in the Serv-U login screen With the Log4j issue in the wild, input fields across the internet have been tested for vulnerability. Although Serv-U was not affected by the log4j issue, It was discovered that better input validation could be implemented.

EPSS

Процентиль: 86%
0.02918
Низкий

5.3 Medium

CVSS3

Дефекты

CWE-20

Связанные уязвимости

CVSS3: 4.3
nvd
около 4 лет назад

Serv-U web login screen to LDAP authentication was allowing characters that were not sufficiently sanitized. SolarWinds has updated the input mechanism to perform additional validation and sanitization. Please Note: No downstream affect has been detected as the LDAP servers ignored improper characters. To insure proper input validation is completed in all environments. SolarWinds recommends scheduling an update to the latest version of Serv-U.

CVSS3: 4.7
fstec
около 4 лет назад

Уязвимости функции веб-аутентификации файлового сервера SolarWinds Serv-U File Server, позволяющая нарушителю повысить свои привилегии

EPSS

Процентиль: 86%
0.02918
Низкий

5.3 Medium

CVSS3

Дефекты

CWE-20