GreyNoise Warns of Active Exploitation Attempts Targeting SolarWinds Serv-U Vulnerability (CVE-2024-28995)
On June 5, 2024, SolarWinds issued a critical advisory regarding a newly discovered path-traversal vulnerability in Serv-U, identified as CVE-2024-28995. The vulnerability, found by Hussein Daher, affects SolarWinds Serv-U versions 15.4.2 HF 1 and earlier. Versions 15.4.2 HF 2 and later have been patched to mitigate the issue.
CVE-2024-28995 is a path-traversal vulnerability that allows unauthenticated attackers to retrieve arbitrary files from the filesystem. The exploit can be executed via a simple GET request to the root directory (/) with the parameters InternalDir and InternalFile specifying the target folder and file, respectively. The vulnerability arises from inadequate validation of path traversal segments (../), permitting attackers to bypass security checks.
GreyNoise Intelligence deployed an advanced honeypot to gather data on exploit attempts. The honeypot closely mimics the vulnerable Serv-U application and responds as a genuine system would. Within days, GreyNoise captured several exploit attempts, including hands-on-keyboard activity.
Exploit attempts observed by GreyNoise include:
- Windows
- Linux
Interestingly, Serv-U’s path-traversal filter checks only the appropriate slashes for the platform (/ for Linux and \ for Windows). This oversight allows exploits using incorrect slashes to bypass the filter and be “fixed” later, leading to successful exploitation.
GreyNoise’s honeypots revealed various payloads targeting critical files like /etc/passwd and Serv-U startup logs. The data showed a mix of common and customized payloads, indicating different levels of sophistication among attackers.
Notable Observations
- Payload Copy-Paste Errors:
One attacker used a payload with an incorrect caret (^) character, suggesting they copied the payload without understanding it. This mistake was observed from an IP address in China. - Hands-on-Keyboard Activity:
A more intriguing find was an attack from a Chinese IP that included a non-English UTF-8 character (%E3%80%81) in the request, indicating manual input. This attacker made multiple attempts over four hours, further suggesting hands-on involvement rather than automated scanning.
SolarWinds advises all users to update to Serv-U version 15.4.2 HF 2 or later to mitigate the vulnerability.