Executive Summary



This Alert is flagged as TOP 25 Common Weakness Enumeration from CWE/SANS. For more information, you can read this.
Summary
Title Dell SonicWALL Scrutinizer SQL injection vulnerability
Informations
Name VU#404051 First vendor Publication 2012-07-25
Vendor VU-CERT Last vendor Modification 2012-07-25
Severity (Vendor) N/A Revision M

Security-Database Scoring CVSS v3

Cvss vector : N/A
Overall CVSS Score NA
Base Score NA Environmental Score NA
impact SubScore NA Temporal Score NA
Exploitabality Sub Score NA
 
Calculate full CVSS 3.0 Vectors scores

Security-Database Scoring CVSS v2

Cvss vector : (AV:N/AC:L/Au:S/C:P/I:P/A:P)
Cvss Base Score 6.5 Attack Range Network
Cvss Impact Score 6.4 Attack Complexity Low
Cvss Expoit Score 8 Authentication Requires single instance
Calculate full CVSS 2.0 Vectors scores

Detail

Vulnerability Note VU#404051

Dell SonicWALL Scrutinizer SQL injection vulnerability

Original Release date: 25 Jul 2012 | Last revised: 25 Jul 2012

Overview

Dell SonicWALL Scrutinizer 9.5.0 and older versions contain a SQL injection vulnerability.

Description

The Dell SonicWALL service bulletin states:

    "After the release of Dell SonicWALL Scrutinizer 9.5.0, we received a report of an issue whereby a Scrutinizer user who had already authenticated to the product could manipulate a certain URL to run SQL commands against the Scrutinizer database. Error output was also displayed which provided debug information detailing the query being run. While the risk to most Scrutinizer installations was low, we decided to proactively publish a patched update to fix this vulnerability in the form of Scrutinizer 9.5.2."

Additional details may be found in the full Dell SonicWALL service bulletin. [PDF]

Impact

A remote authenticated attacker may be able to run arbitrary SQL commands and exfiltrate sensitive data.

Solution

Apply an Update

The Dell SonicWALL service bulletin states:

    "We recommend existing users of Dell SonicWALL Scrutinizer 9.5.0 and earlier versions upgrade to version 9.5.2 to prevent unauthorized queries from being run via the URL by authenticated users. Version 9.5.2 is available for download from www.mysonicwall.com. Users should log onto mySonicWALL and click on Downloads > Download Center in the navigation panel on the left, then select “Scrutinizer Software” in the Software Type drop down menu."

Vendor Information (Learn More)

VendorStatusDate NotifiedDate Updated
Dell Computer Corporation, Inc.Affected29 Jun 201225 Jul 2012
If you are a vendor and your product is affected, let us know.

CVSS Metrics (Learn More)

GroupScoreVector
Base8.5AV:N/AC:M/Au:S/C:C/I:C/A:C
Temporal7.0E:F/RL:OF/RC:C
Environmental7.0CDP:ND/TD:ND/CR:ND/IR:ND/AR:ND

References

  • http://www.sonicwall.com/shared/download/Dell_SonicWALL_Scrutinizer_Service_Bulletin_for_SQL_injection_vulnerability_CVE.pdf

Credit

Thanks to Offensive Security for reporting this vulnerability.

This document was written by Jared Allar.

Other Information

  • CVE IDs:CVE-2012-2962
  • Date Public:20 Jul 2012
  • Date First Published:25 Jul 2012
  • Date Last Updated:25 Jul 2012
  • Document Revision:13

Feedback

If you have feedback, comments, or additional information about this vulnerability, please send us email.


This product is provided subject to the Notification as indicated here: http://www.us-cert.gov/legal.html#notify

Original Source

Url : http://www.kb.cert.org/vuls/id/404051

CWE : Common Weakness Enumeration

% Id Name
100 % CWE-89 Improper Sanitization of Special Elements used in an SQL Command ('SQL Injection') (CWE/SANS Top 25)

CPE : Common Platform Enumeration

TypeDescriptionCount
Application 1

OpenVAS Exploits

Date Description
2012-08-21 Name : Dell SonicWALL Scrutinizer 'q' Parameter SQL Injection Vulnerability
File : nvt/gb_scrutinizer_54625.nasl

Nessus® Vulnerability Scanner

Date Description
2012-08-20 Name : The remote web server hosts an application that is affected by a SQL injectio...
File : scrutinizer_statusfilter_sqli.nasl - Type : ACT_ATTACK

Alert History

If you want to see full details history, please login or register.
0
Date Informations
2014-02-17 12:07:48
  • Multiple Updates