Solarwinds: Gaps in platform and Serv-U enable malicious code smuggling

Solarwinds warns of security vulnerabilities in the platform and in Serv-U. Attackers can infiltrate code or extend their rights, for example.

listen Print view
Stylized image: Laptop on desk in front of server cabinets, on fire

Security gaps jeopardize network security.

(Image: Bild erstellt mit KI in Bing Designer durch heise online / dmk)

3 min. read

Solarwinds is providing updated software for the self-hosted platform and the Serv-U-FTP server. The updates patch vulnerabilities, some of which are classified as critical and allow attackers to inject and execute malicious code, among other things.

The update to Solarwinds Platform 2024.4 fixes two security vulnerabilities in the core software and six in supplied third-party components. According to the release notes for the new version, an "uncontrolled search path element" allows attackers to escalate local privileges (CVE-2024-45710, CVSS 7.8, risk"high"). In addition, malicious actors can inject malicious scripts when editing elements through a cross-site scripting vulnerability (CVE-2024-45715, CVSS 7.1, high).

There are also security gaps in several third-party components. Lodash.js, for example, contains a vulnerability classified as critical (CVE-2019-10744, CVSS 9.1), Moment.js contains a high-risk vulnerability (CVE-2022-31129, CVSS 7.5) and Python Tudoor also contains a vulnerability classified as high risk (CVE-2023-29483, CVSS 7.0). There are also gaps in OpenSSL (CVE-2024-2511, CVSS 5.9; CVE-2024-0727, CVSS 5.5) and in RabbitMQ (CVE-2023-46118, CVSS 4.9).

Videos by heise

IT managers should apply the updates quickly due to the severity of the vulnerabilities.

The developers have also patched two vulnerabilities in the Serv-U FTP server. According to the vulnerability description, a directory traversal vulnerability allows malicious code to be smuggled in and executed, depending on the access rights of the authenticated user (CVE-2024-45711, CVSS 7.5, high). In addition, registered attackers can abuse a cross-site scripting vulnerabilityto modify a variable with malicious content (CVE-2024-45714, CVSS 5.7, medium). Serv-U 15.4.2.3 and older versions are affected, the now available software version 15.5 corrects the errors.

Solarwinds does not provide details on how the vulnerabilities can be attacked and how successful attacks can possibly be detected.

Vulnerabilities in Solarwinds products are frequently targeted by attackers. On Wednesday of this week, for example, attacks on Solarwinds Web Help Desk became known. The vulnerability that the malicious actors are abusing was already closed with security updates in August. However, admins must also apply these to protect their instances.

(dmk)

Don't miss any news – follow us on Facebook, LinkedIn or Mastodon.

This article was originally published in German. It was translated with technical assistance and editorially reviewed before publication.