News Document Title: ==================== Sonicwall addressed bug and updated to SonicOS v5.8.1.9 Release Date: ============= 2012-12-18 Laboratory Article: =================== This week (dell) sonicwall patched a medium severity remote POST injection vulnerability in the firewall product series v5.8.1.8 and upgraded the version of SonicOS official to 5.8.1.9. Sonicwall Bug ID [SBI]: 123995 The vulnerability was located in the Firewall > Match Object > Edit Match Object section when processing to request via the `Search > appFirewallObjects` module the bound vulnerable [searchStr] application parameter. The persistent injected script code will be executed out of the searchstr name listing web application context. Vulnerable Module(s): [+] Search > appFirewallObjects Vulnerable Parameter(s): [+] [searchStr] - Name Listing The vulnerability has been addressed by sonicwall within 1 month after the silent disclosure to the sonicwall security team. 2012-11-18: Researcher Notification and Coordination 2012-11-20: Vendor Notification 2012-11-20: Vendor Response/Feedback 2012-12-04: Vendor Fix/Patch (SonicOS 5.8.1.9) 2012-12-18: Public Disclosure The issue itself has been published 1 week later (2012-12-18) to protect the sonicwall customers. The update or upgrade can be downloaded in the sonicwall customer area since the 5th december. Advisory: http://www.vulnerability-lab.com/get_content.php?id=769