Juniper Networks
Solutions
Products & Services
Company
Partners
Support
Education

Signature Detail

Security Intelligence Center
Signatures
Print

This site is deprecated. Please CLICK HERE for latest updates

Short Name

HTTP:SONICWALL-GMS-RCE

Severity

Major

Recommended

No

Recommended Action

Drop

Category

HTTP

Keywords

SonicWALL GMS skipSessionCheck Remote Code Execution

Release Date

2013/02/21

Update Number

2235

Supported Platforms

idp-4.0+, isg-3.0+, j-series-9.5+, mx-11.4+, srx-12.1+, srx-branch-12.1+, vmx-17.4+, vsrx-12.1+, vsrx3bsd-18.2+

HTTP: SonicWALL GMS skipSessionCheck Remote Code Execution


This signature detects attempts to exploit a known vulnerability against SoniWALL GMS. A successful attack can lead to arbitrary code execution.

Extended Description

An Authentication Bypass Vulnerability exists in DELL SonicWALL Analyzer 7.0, Global Management System (GMS) 4.1, 5.0, 5.1, 6.0, and 7.0; Universal Management Appliance (UMA) 5.1, 6.0, and 7.0 and ViewPoint 4.1, 5.0, 5.1, and 6.0 via the skipSessionCheck parameter to the UMA interface (/appliance/), which could let a remote malicious user obtain access to the root account.

Affected Products

  • Sonicwall analyzer 7.0
  • Sonicwall global_management_system 4.1
  • Sonicwall global_management_system 5.0
  • Sonicwall global_management_system 5.1
  • Sonicwall global_management_system 6.0
  • Sonicwall global_management_system 7.0
  • Sonicwall universal_management_appliance 5.1
  • Sonicwall universal_management_appliance 6.0
  • Sonicwall universal_management_appliance 7.0
  • Sonicwall viewpoint 4.1
  • Sonicwall viewpoint 5.0
  • Sonicwall viewpoint 6.0

References

  • BugTraq: 57445
  • CVE: CVE-2013-1359

Site Map
RSS Feeds
Careers
Accessibility
Feedback
Privacy Policy
Legal Notices
Copyright © 1999-2010 Juniper Networks, Inc. All rights reserved.
Help
|
My Account
|
Log Out