diff --git a/exploits/hardware/webapps/50485.txt b/exploits/hardware/webapps/50485.txt new file mode 100644 index 000000000..643b70420 --- /dev/null +++ b/exploits/hardware/webapps/50485.txt @@ -0,0 +1,245 @@ +# Exploit Title: Sonicwall SonicOS 6.5.4 - 'Common Name' Cross-Site Scripting (XSS) +# Date: 2021-10-18 +# Exploit Author: Vulnerability Lab +# Vendor Homepage: https://www.sonicguard.com/NSV-800.asp +# Version: 6.5.4 + +Document Title: +=============== +Sonicwall SonicOS 6.5.4 - Cross Site Scripting Web Vulnerability + + +References (Source): +==================== +https://www.vulnerability-lab.com/get_content.php?id=2272 + + +Release Date: +============= +2021-10-18 + + +Vulnerability Laboratory ID (VL-ID): +==================================== +2272 + + +Common Vulnerability Scoring System: +==================================== +5 + + +Vulnerability Class: +==================== +Cross Site Scripting - Non Persistent + + +Current Estimated Price: +======================== +500€ - 1.000€ + + +Product & Service Introduction: +=============================== +The design, implementation and deployment of modern network architectures, such as virtualization and cloud, continue to be a game-changing +strategy for many organizations. Virtualizing the data center, migrating to the cloud, or a combination of both, demonstrates significant +operational and economic advantages. However, vulnerabilities within virtual environments are well-documented. New vulnerabilities are +discovered regularly that yield serious security implications and challenges. To ensure applications and services are delivered safely, +efficiently and in a scalable manner, while still combating threats harmful to all parts of the virtual framework including virtual +machines (VMs), application workloads and data must be among the top priorities. + +(Copy of the Homepage: https://www.sonicguard.com/NSV-800.asp ) + + +Abstract Advisory Information: +============================== +The vulnerability laboratory core research team discovered a non-persistent cross site scripting web vulnerability in the SonicWall SonicOS 6.5.4. + + +Affected Product(s): +==================== +Model: SonicWall SonicOS +Firmware: 6.5.4.4-44v-21-1288-aa5b8b01 (6.5.4) +OS: SonicOS Enhanced + + +Vulnerability Disclosure Timeline: +================================== +2021-07-24: Researcher Notification & Coordination (Security Researcher) +2021-07-25: Vendor Notification (Security Department) +2021-**-**: Vendor Response/Feedback (Security Department) +2021-**-**: Vendor Fix/Patch (Service Developer Team) +2021-**-**: Security Acknowledgements (Security Department) +2021-10-18: Public Disclosure (Vulnerability Laboratory) + + +Discovery Status: +================= +Published + + +Exploitation Technique: +======================= +Remote + + +Severity Level: +=============== +Medium + + +Authentication Type: +==================== +Restricted Authentication (Guest Privileges) + + +User Interaction: +================= +Medium User Interaction + + +Disclosure Type: +================ +Responsible Disclosure + + +Technical Details & Description: +================================ +A client-side input validation vulnerability has been discovered in the official SonicWall SonicOS 6.5.4. +The vulnerability allows remote attackers to hijack sessionc credentials or manipulate client-side requested application content. + +The vulnerability is located in the common name input field in the Decryption Service - Common Name - Show Connection Failures module. +Remote attackers with low privileged user accounts can inject own script codes to compromise session credentials. It is also possible +to build special crafted html pages with get / post method requests to hijack non-expired user account sessions. The request method to +inject is get and the attack vector is located on the client-side without being persistent. + +Successful exploitation of the vulnerability allows remote attackers to hijack session credentials (non-persistent), phishing +(non-persistent), external redirect to malicious sources (non-persistent) or client-side application content manipulation. +Exploitation of the vulnerability requires low or medium user interaction or a low privileged (restricted) user account. + +Module(s): +[+] Decryption Service + + +Vulnerable Function(s): +[+] Edit (Bearbeiten) + + +Vulnerable Parameter(s): +[+] Common Name + + +Affected Module(s): +[+] Show Connection Failures + + +Proof of Concept (PoC): +======================= +The client-side cross site scripting web vulnerability can be exploited by remote attackers with user interaction. +For security demonstration or to reproduce the vulnerability follow the provided information and steps below to continue. + + +Manual steps to reproduce the vulnerability ... +1. Login as restricted or privileged user to the sonicWall sonicOS 6.5.4 virtual firewall application +2. Open the Decryption Service > Common Name > Show Connection Failures +3. Click on Edit and inject a js test payload into the restricted client content +4. Pushing anywhere else outsite field will temporarily save the payload +5. The script code immediately executes in the web browsers context +5. Successful reproduce of the script code inject web vulnerability! + + +Vulnerable Source: Connection Failure List (getConnFailureList.json) +