Document Title: =============== SonicWall AntiSpam & EMail v7.x - Multiple Vulnerabilities References (Source): ==================== http://www.vulnerability-lab.com/get_content.php?id=58 Release Date: ============= 2012-01-07 Vulnerability Laboratory ID (VL-ID): ==================================== 58 Product & Service Introduction: =============================== Spam-, Phishing- und mit Viren infizierte Nachrichten verursachen in Unternehmen weltweit weiterhin große Schäden. Die Kosten, die durch Produktivitätseinbußen, gestohlene Benutzeridentitäten und den Missbrauch vertraulicher Daten entstehen, können astronomische Höhen erreichen. SonicWALL® Email Security (SES)-Appliances, -Software und -Dienste stellen eine breite Palette an Anti Spam- und E Mail-Sicherheitslösungen bereit, die den Sicherheitsanforderungen von Einzelpersonen und von Unternehmen mit 100.000 Mitarbeitern gleichermaßen gerecht werden. SonicWALL sorgt dafür, dass Sie und Ihr Unternehmen E Mail sicher, produktiv und kosteneffizient nutzen können (Copy of the Vendor Homepage: http://www.sonicwall.com/de/Email_Security.html) Abstract Advisory Information: ============================== Vulnerability-Lab Team discovered multiple Web Vulnerabilities on SonicWalls AntiSpam & EMail Security Appliance Application v7.x. Vulnerability Disclosure Timeline: ================================== 2012-01-07: Public or Non-Public Disclosure Discovery Status: ================= Published Affected Product(s): ==================== DELL SonicWall Product: AntiSpam & EMail Security Appliance Application 7.3.1 & older versions Exploitation Technique: ======================= Remote Severity Level: =============== High Technical Details & Description: ================================ 1.1 A persistent input validation vulnerability is detected on SonicWalls AntiSpam & EMail Security Appliance Application v7.3.x. Remote attackers or low privileged user accounts can manipulate specific application requests via persistent script code inject & low required user inter action. Successful exploitation can result in session hijacking, persistent context manipulation, application-side phishing. Vulnerable Module(s): [+] MGMTUser Delegate 1.2 A non-persistent input validation vulnerability is detected on SonicWalls AntiSpam & EMail Security Appliance Application. Remote attackers can force via high required user inter action client-side requests to steal session data(cookies). Vulnerable Module(s): [+] MTA Queue Report Picture(s): ../ive1.png 1.3 A redirection vulnerability is detected on SonicWalls AntiSpam & EMail Security Appliance Application. The vulnerability allows an attacker to implement a malicious extern website into the panel website. The redirect is exploitable via direction value. Vulnerable Module(s): [+] User Mail View Picture(s): ../redirect.png Affected Version(s): SonicWall AntiSpam & EMail Security Appliance Application - v7.3.x or v7.3.4.5725 & older versions Typus: AntiSpam & EMail Security Appliance; Comphresive Box; Unified Threat Management Appliance Proof of Concept (PoC): ======================= This vulnerabilities can be exploited by local or remote attackers. For demonstration or reproduce ... 1.1 Code Review(mgmtuser_message.html): Input Validation Vulnerability (Persistent)
Likely Spam blocking off (deliver messages to recipients) | |
Store in Junk Box and delete after 45 days. | |
Tag with " onchange="javascript:document.forms[0].dispositionMaybe[2].checked=true;"> added to the subject |