CVE-2018-10241
https://notcve.org/view.php?id=CVE-2018-10241
A denial of service vulnerability in SolarWinds Serv-U before 15.1.6 HFv1 allows an authenticated user to crash the application (with a NULL pointer dereference) via a specially crafted URL beginning with the /Web%20Client/ substring. Una vulnerabilidad de denegación de servicio (DoS) en SolarWinds Serv-U en versiones anteriores a la 15.1.6 HFv1 permite que un usuario autenticado provoque el cierre inesperado de la aplicación (con una desreferencia de puntero NULL) mediante una URL especialmente manipulada que comienza con la subcadena /Web%20Client/. • https://www.bishopfox.com/news/2018/05/solarwinds-serv-u-managed-file-transfer-denial-of-service • CWE-476: NULL Pointer Dereference •
CVE-2018-10240
https://notcve.org/view.php?id=CVE-2018-10240
SolarWinds Serv-U MFT before 15.1.6 HFv1 assigns authenticated users a low-entropy session token that can be included in requests to the application as a URL parameter in lieu of a session cookie. This session token's value can be brute-forced by an attacker to obtain the corresponding session cookie and hijack the user's session. SolarWinds Serv-U MFT en versiones anteriores a la 15.1.6 HFv1 asigna a usuarios autenticados un token de sesión con poca entropía que puede incluirse en peticiones a la aplicación como un parámetro URL en lugar de una cookie de sesión. El valor del token de sesión puede ser adivinado a la fuerza por un atacante para obtener la correspondiente cookie de sesión y secuestrar la sesión de usuario. • https://www.bishopfox.com/news/2018/05/solarwinds-serv-u-managed-file-transfer-insufficient-session-id-entropy • CWE-331: Insufficient Entropy •
CVE-2009-4873 – Serv-U Web Client 9.0.0.5 - Remote Buffer Overflow
https://notcve.org/view.php?id=CVE-2009-4873
Stack-based buffer overflow in the HTTP server in Rhino Software Serv-U Web Client 9.0.0.5 allows remote attackers to cause a denial of service (server crash) or execute arbitrary code via a long Session cookie. Desbordamiento de búfer basado en pila en el servidor HTTP en Rhino Software Serv-U Web Client v9.0.0.5 permite a atacantes remotos causar una denegación de servicio (caída de servidor) o ejecutar código de su elección a través de una cookie de sesión larga. • https://www.exploit-db.com/exploits/9966 https://www.exploit-db.com/exploits/9800 http://secunia.com/advisories/37228 http://www.rangos.de/ServU-ADV.txt http://www.securityfocus.com/bid/36895 http://www.vupen.com/english/advisories/2009/3116 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •
CVE-2000-1033 – Cat Soft Serv-U FTP Server 2.5.x - Brute Force
https://notcve.org/view.php?id=CVE-2000-1033
Serv-U FTP Server allows remote attackers to bypass its anti-hammering feature by first logging on as a valid user (possibly anonymous) and then attempting to guess the passwords of other users. • https://www.exploit-db.com/exploits/20334 http://www.securityfocus.com/archive/1/141905 http://www.securityfocus.com/bid/1860 https://exchange.xforce.ibmcloud.com/vulnerabilities/5436 •
CVE-2000-0176
https://notcve.org/view.php?id=CVE-2000-0176
The default configuration of Serv-U 2.5d and earlier allows remote attackers to determine the real pathname of the server by requesting a URL for a directory or file that does not exist. • http://archives.neohapsis.com/archives/bugtraq/2000-02/0417.html http://www.securityfocus.com/bid/1016 •