Skip to content

Commit 7e37ca5

Browse files
committed
add in link to AKB analysis
1 parent 1d1c37b commit 7e37ca5

File tree

2 files changed

+4
-1
lines changed

2 files changed

+4
-1
lines changed

documentation/modules/auxiliary/gather/solarwinds_servu_fileread_cve_2024_28995.md

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -3,6 +3,8 @@ This module exploits an unauthenticated file read vulnerability, due to director
33
SolarWinds Serv-U FTP Server 15.4, Serv-U Gateway 15.4, and Serv-U MFT Server 15.4. All versions prior to
44
the vendor supplied hotfix "15.4.2 Hotfix 2" (version 15.4.2.157) are affected.
55

6+
For a technical analysis of the vulnerability, read our [Rapid7 Analysis](https://attackerkb.com/topics/2k7UrkHyl3/cve-2024-28995/rapid7-analysis).
7+
68
## Testing
79
Follow the below instruction for either Linux or Windows.
810
* Download a vulnerable version of SolarWinds Serv-U MFT Server, for example version `15.4.2.126`.

modules/auxiliary/gather/solarwinds_servu_fileread_cve_2024_28995.rb

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -24,7 +24,8 @@ def initialize(info = {})
2424
],
2525
'References' => [
2626
['CVE', '2024-28995'],
27-
['URL', 'https://www.solarwinds.com/trust-center/security-advisories/cve-2024-28995']
27+
['URL', 'https://www.solarwinds.com/trust-center/security-advisories/cve-2024-28995'],
28+
['URL', 'https://attackerkb.com/topics/2k7UrkHyl3/cve-2024-28995/rapid7-analysis']
2829
],
2930
'DefaultOptions' => {
3031
'RPORT' => 443,

0 commit comments

Comments
 (0)