First published: Wed Feb 03 2021(Updated: )
SolarWinds Serv-U before 15.2.2 allows Authenticated Directory Traversal.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
SolarWinds Serv-U | <15.2.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability CVE-2020-27994 refers to a directory traversal vulnerability in SolarWinds Serv-U before version 15.2.2.
Yes, CVE-2020-27994 can be exploited by authenticated users.
The severity of the vulnerability CVE-2020-27994 is medium with a CVSS score of 6.5.
To fix the vulnerability CVE-2020-27994, upgrade to SolarWinds Serv-U version 15.2.2 or later.
You can find more information about the vulnerability CVE-2020-27994 in the references provided: http://packetstormsecurity.com/files/161399/SolarWinds-Serv-U-FTP-Server-15.2.1-Path-Traversal.html, http://seclists.org/fulldisclosure/2021/Feb/36, and https://documentation.solarwinds.com/en/success_center/servu/Content/Release_Notes/Servu_15-2-2_release_notes.htm.