CVE-2019-12181

8.8 HIGH

📋 TL;DR

This CVE describes a privilege escalation vulnerability in SolarWinds Serv-U FTP Server for Linux versions before 15.1.7. It allows local attackers to execute arbitrary commands with elevated privileges by exploiting improper input sanitization in the prepareinstallation script. Organizations running vulnerable Serv-U versions on Linux systems are affected.

💻 Affected Systems

Products:
  • SolarWinds Serv-U FTP Server
Versions: All versions before 15.1.7
Operating Systems: Linux
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects Linux installations of Serv-U. Windows versions are not vulnerable.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise where an attacker gains root privileges, installs persistent backdoors, accesses sensitive data, and pivots to other systems.

🟠

Likely Case

Local privilege escalation allowing attackers to gain root access on the affected Serv-U server, potentially leading to data theft, service disruption, or lateral movement.

🟢

If Mitigated

Limited impact with proper access controls, monitoring, and network segmentation preventing lateral movement and containing the breach.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: CONFIRMED
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploit requires local access to the system. Multiple public exploit scripts and detailed write-ups are available.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 15.1.7

Vendor Advisory: https://support.solarwinds.com/SuccessCenter/s/article/Serv-U-Potential-elevation-of-privileges-on-Linux-systems

Restart Required: Yes

Instructions:

1. Download Serv-U 15.1.7 or later from SolarWinds portal. 2. Stop the Serv-U service. 3. Install the update following vendor instructions. 4. Restart the Serv-U service. 5. Verify the version is 15.1.7 or higher.

🔧 Temporary Workarounds

Remove execute permissions from prepareinstallation script

linux

Temporarily mitigates the vulnerability by preventing execution of the vulnerable script

chmod -x /opt/Serv-U/prepareinstallation

Restrict access to Serv-U directories

linux

Limit which users can access Serv-U installation directories

chmod 750 /opt/Serv-U/
chown root:root /opt/Serv-U/prepareinstallation

🧯 If You Can't Patch

  • Implement strict access controls to limit who has local access to Serv-U servers
  • Monitor for suspicious privilege escalation attempts and command execution from Serv-U processes

🔍 How to Verify

Check if Vulnerable:

Check if Serv-U version is below 15.1.7 and the prepareinstallation script exists with execute permissions

Check Version:

cat /opt/Serv-U/version.txt || serv-u --version

Verify Fix Applied:

Verify Serv-U version is 15.1.7 or higher and the prepareinstallation script has been patched or removed

📡 Detection & Monitoring

Log Indicators:

  • Unusual privilege escalation attempts
  • Execution of prepareinstallation script by non-root users
  • Suspicious command execution from Serv-U processes

Network Indicators:

  • Unexpected outbound connections from Serv-U server
  • Anomalous FTP traffic patterns

SIEM Query:

source="serv-u" AND (event="privilege_escalation" OR process="prepareinstallation")

🔗 References

📤 Share & Export