Directory Traversal Vulnerability in Rhino Software Serv-U File Server
CVE-2009-1031

Currently unrated

Key Information:

Vendor

Solarwinds

Vendor
CVE Published:
20 March 2009

Badges

๐Ÿ‘พ Exploit Exists๐ŸŸก Public PoC๐ŸŸฃ EPSS 14%

What is CVE-2009-1031?

The FTP server within Rhino Software's Serv-U File Server versions 7.0.0.1 to 7.4.0.1 contains a directory traversal vulnerability, allowing remote attackers to exploit an MKD request with a crafted input meant to manipulate directory structures. This type of vulnerability enables unauthorized access to create arbitrary directories outside of the designated file paths, potentially leading to further exploitation of the server and exposure of sensitive data.

Exploit Proof of Concept (PoC)

PoC code is written by security researchers to demonstrate the vulnerability can be exploited. PoC code is also a key component for weaponization which could lead to ransomware.

References

EPSS Score

14% chance of being exploited in the next 30 days.

Timeline

  • ๐ŸŸก

    Public PoC available

  • ๐Ÿ‘พ

    Exploit known to exist

  • Vulnerability published

  • Vulnerability Reserved

.