Lucene search

K
saintSAINT CorporationSAINT:F3B855C79359E1F0667451D37C614E49
HistoryMar 18, 2013 - 12:00 a.m.

SonicWall Multiple Products skipSessionCheck Authentication Bypass

2013-03-1800:00:00
SAINT Corporation
www.saintcorporation.com
30

0.972 High

EPSS

Percentile

99.8%

Added: 03/18/2013
CVE: CVE-2013-1359
BID: 57445
OSVDB: 89347

Background

Dell SonicWALL has several management and reporting solutions which provide a centralized architecture for creating and managing security policies, providing real-time monitoring and alerts, and delivering compliance and usage reports from a single management interface. These products include SonicWALL ViewPoint (being discontinued and replaced by SonicWALL Analyzer), Global Management System (GMS), and the Universal Management Appliance (UMA).

Problem

Various versions of Dell SonicWALL ViewPoint, Analyzer, GMS and UAM contain an error within the authentication mechanism of the web interface which can be exploited to bypass the authentication mechanism by setting the **skipSessionCheck** parameter to 1.

Resolution

Obtain HotFix 125076.77 from <http://www.mysonicwall.com> and apply the appropriate files for your product.

References

<http://secunia.com/advisories/51758/&gt;

Limitations

This exploit was tested against SonicWALL GMS 7.0 SP1 on Windows Server 2003 SP2 English and Windows Server 2008 SP2 (with DEP OptOut). It was also tested against SonicWALL GMS Virtual Appliance 7.0 SP1 on SonicWALL Linux 2.6.23.8.

This exploit supports IPv6 on Windows platforms, but not on GMS Virtual Appliance platforms.

Platforms

Windows
Linux

0.972 High

EPSS

Percentile

99.8%

Related for SAINT:F3B855C79359E1F0667451D37C614E49