what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New

SonicWall NSA 4500 Cross Site Scripting / Session Hijacking

SonicWall NSA 4500 Cross Site Scripting / Session Hijacking
Posted Oct 4, 2011
Authored by Hugo Vazquez Carames | Site pentest.es

The SonicWall NSA 4500 suffers from cross site scripting and session id hijacking vulnerabilities.

tags | exploit, vulnerability, xss
SHA-256 | 527eef87d88a5de876a908763739592e531c1552a1ad2ad9b117345acb0fadeb

SonicWall NSA 4500 Cross Site Scripting / Session Hijacking

Change Mirror Download
While pentesting a a WIFI network on a customer, we found some vulnerabilities in the SonicWall NSA 4500. You can find details here:

http://www.pentest.es/vulns_sonicpoint.txt

--------------------------------------------------
Title:
======

SonicWall products with incompatible MAC spoofing protection


Date:
=====
2011-09-29


Introduction:
=============

The SonicWall NSA 4500 product has a MAC spoofing protection option that can be activated in wireless networks per ESSID basis. This protection will not work if the acces point is a Sonicpoint. No warning or notice is presented to the administrator, wich means that protection will be active but not working. This vulnerability has been detected while pentesting a customer WIFI deployment with that configuration: SonicWall NSA 4500 + SonicWall Sonicpoints.


Report-Timeline:
================
2011-09-26: Vendor Notification
2011-09-28: Vendor Final Response

The vendor has confirmed the bug via customer support response.


Affected Products:
==================

SonicWall NSA 4500 + SonicWall Sonicpoints


Exploitation-Technique:
=======================

Common ARP spoofing attacks.


Severity:
=========

High. Customers don't know they are unprotected even if they have the MAC spoofing activated.


Details:
========



--------------------------------------------------

Title:
======

SonicWall web admin interface múltiple code injection vulnerabilities


Date:
=====
2011-09-29


Introduction:
=============

The SonicWall NSA 4500 web admin interface offers the option of customize some web pages directly from the admin interface. For this, the web interface has some forms where the admin can put the code and test it via a preview feature. This preview feature will show the page and execute all the javascript code inside it in the web admin security context, wich leads to many traditional attacks, like XSS, session hijacking...


Report-Timeline:
================

Not reported.


Affected Products:
==================

SonicWall NSA 4500


Exploitation-Technique:
=======================

Common code injection techniques (XSS)


Severity:
=========

Medium.


Details:
========

To reproduce the flaw, just go to main.html, Users->Settings and in the "Login page content" put whatever code you want and it will be executed in the admin context. This behaviour is a dangerous feature of the web admin interface, because it can be exploited and triggered in several ways by an attacker. There are other fields other than "Login page content" that can be exploited in the same way.

--------------------------------------------------


Title:
======

SonicWall weak HTTP session ID's


Date:
=====
2011-09-29


Introduction:
=============

The SonicWall NSA 4500 web admin interface generates session ID's that are stored in the "SessId" cookie variable. The ID's are guessable via brute force, wich leads to admin session hijacking.


Report-Timeline:
================

Not reported.


Affected Products:
==================

SonicWall NSA 4500


Exploitation-Technique:
=======================

To brute force, just make requests like this:


GET /log.wri HTTP/1.0
Host: 123.123.123.123
Connection: close
User-Agent: brute-forcing
Cookie: SessId=111111111

Where SessId is the variable that we are bruteforcing -it should change in every request- and Host is the SonicWall IP.


If you fail you get a 404 HTTP response. If you succeed, you will get a 200 HTTP response, and will see the SonicWall logs.


Severity:
=========

Medium.


Details:
========

HTTP "SessId" bruteforce. From a LAN, 10% of all ID's can be bruteforced in 1 day. The more administrator are logged the more dangerous is the scenario, and easier is the brute force attack.
--------------------------------------------------

info@pentest.es
Hugo Vázquez Caramés
PENTEST Consultores
Login or Register to add favorites

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    8 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    11 Files
  • 23
    Apr 23rd
    68 Files
  • 24
    Apr 24th
    23 Files
  • 25
    Apr 25th
    16 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close