cve/2023/CVE-2023-34133.md

20 lines
1.2 KiB
Markdown
Raw Normal View History

2024-05-25 21:48:12 +02:00
### [CVE-2023-34133](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-34133)
![](https://img.shields.io/static/v1?label=Product&message=Analytics&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=GMS&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=%3D%202.5.0.4-R7%20and%20earlier%20versions%20&color=brighgreen)
![](https://img.shields.io/static/v1?label=Version&message=%3D%209.3.2-SP1%20and%20earlier%20versions%20&color=brighgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20('SQL%20Injection')&color=brighgreen)
### Description
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in SonicWall GMS and Analytics allows an unauthenticated attacker to extract sensitive information from the application database. This issue affects GMS: 9.3.2-SP1 and earlier versions; Analytics: 2.5.0.4-R7 and earlier versions.
### POC
#### Reference
- http://packetstormsecurity.com/files/174571/Sonicwall-GMS-9.9.9320-Remote-Code-Execution.html
#### Github
No PoCs found on GitHub currently.