A Host Header Redirection vulnerability in SonicOS potentially allows a remote attacker to redirect firewall management users to arbitrary web domains.
Attack Vector Network
Attack Complexity Low
Privileges Required None
Scope Changed
Confidentiality Impact Low
Integrity Impact Low
Availability Impact None
User Interaction Required
No CVSS v3.0
Access Vector Network
Access Complexity Medium
Authentication None
Confidentiality Impact Partial
Integrity Impact Partial
Availability Impact None
AV:N/AC:M/Au:N/C:P/I:P/A:N
Vendors | Products |
---|---|
Sonicwall |
|
Configuration 1 [-]
AND |
|
Configuration 2 [-]
AND |
|
Configuration 3 [-]
AND |
|
Configuration 4 [-]
AND |
|
Configuration 5 [-]
AND |
|
Configuration 6 [-]
AND |
|
Configuration 7 [-]
AND |
|
References
Link | Resource |
---|---|
http://packetstormsecurity.com/files/164502/Sonicwall-SonicOS-7.0-Host-Header-Injection.html | Exploit Third Party Advisory VDB Entry |
https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2021-0019 | Vendor Advisory |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: sonicwall
Published: 2021-10-12T22:55:09
Updated: 2021-10-13T16:06:13
Reserved: 2020-12-17T00:00:00
Link: CVE-2021-20031
JSON object: View
NVD Information
Status : Analyzed
Published: 2021-10-12T23:15:07.727
Modified: 2021-10-19T23:10:39.157
Link: CVE-2021-20031
JSON object: View
Redhat Information
No data.
CWE