Multiple SQL injection vulnerabilities in Dell SonicWall Scrutinizer 11.0.1 allow remote authenticated users to execute arbitrary SQL commands via the (1) selectedUserGroup parameter in a create new user request to cgi-bin/admin.cgi or the (2) user_id parameter in the changeUnit function, (3) methodDetail parameter in the methodDetail function, or (4) xcNetworkDetail parameter in the xcNetworkDetail function in d4d/exporters.php.
References
Link | Resource |
---|---|
http://seclists.org/fulldisclosure/2014/Jul/44 | Mailing List Third Party Advisory |
https://gist.github.com/brandonprry/36b4b8df1cde279a9305 | Third Party Advisory |
http://www.securityfocus.com/bid/68495 | Third Party Advisory VDB Entry |
https://gist.github.com/brandonprry/76741d9a0d4f518fe297 | Exploit Third Party Advisory |
http://packetstormsecurity.com/files/127429/Dell-Sonicwall-Scrutinizer-11.01-Code-Execution-SQL-Injection.html | Third Party Advisory VDB Entry |
http://packetstormsecurity.com/files/137098/Dell-SonicWALL-Scrutinizer-11.01-methodDetail-SQL-Injection.html | Third Party Advisory VDB Entry |
https://www.exploit-db.com/exploits/39836/ | Third Party Advisory VDB Entry |
https://exchange.xforce.ibmcloud.com/vulnerabilities/94439 | Third Party Advisory VDB Entry |
Configurations
Information
Published : 2014-07-16 07:19
Updated : 2018-03-12 10:23
NVD link : CVE-2014-4977
Mitre link : CVE-2014-4977
JSON object : View
CWE
CWE-89
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
Products Affected
sonicwall
- scrutinizer