VulnerAlert



APPLICATION
SONICWALL
19-04-2025 23:44

CVE-2016-9683 Vulnerabilidad documentada

9.8 CRITICAL
Tags
#injection
#exploit
#web
#server
#machine
#form
#config
#admin
#sonicwall
#application
#vulnerability
#vulnerable
#remote
#pass
#issue
#inject
#configuration
#allow
#access
Descripción
The SonicWall Secure Remote Access server (version 8.1.0.2-14sv) is vulnerable to a Command Injection vulnerability in its web administrative interface. This occurs the 'extensionsettings' CGI (/cgi-bin/extensionsettings) component responsible for handling some of server's internal configurations. The application doesn't properly escape information it's passed when processing particular multi-part form request involving scripts. filename 'scriptname' variable read unsanitized before call system() performed - allowing remote command injection. Exploitation this yields shell access machine under nobody user account. Issue ID 181195.
http://documents.software.dell.com/sonicwall-sma-100-series/8.1.0.7/release-notes/resolved-issues?ParentProduct=868
http://pastebin.com/eJbeXgBr
http://www.securityfocus.com/bid/96375
https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2016-0004
http://documents.software.dell.com/sonicwall-sma-100-series/8.1.0.7/release-notes/resolved-issues?ParentProduct=868
http://pastebin.com/eJbeXgBr
http://www.securityfocus.com/bid/96375
https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2016-0004
Referencia
Link externo
Ver detalles

Fuente
https://nvd.nist.gov/vuln/detail/CVE-2016-9683
Resultados similares
Coincidentes en almenos en 50% de los tags
19-04-2025 CVE-2016-9684
The SonicWall Secure Remote Access server (version 8.1.0.2-14sv) is vulnerable to a Remote Comm...
Ver información
19-04-2025 CVE-2016-9682
The SonicWall Secure Remote Access server (version 8.1.0.2-14sv) is vulnerable to two Remote Co...
Ver información
Icons made by Freepik from www.flaticon.com
Este Proyecto es cofinanciado por el Consejo Nacional de Ciencia y Tecnología (CONACYT) a través del PROINNOVA
Proyecto realizado por