cve/2023/CVE-2023-34127.md

20 lines
1.2 KiB
Markdown
Raw Normal View History

2024-05-25 21:48:12 +02:00
### [CVE-2023-34127](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-34127)
![](https://img.shields.io/static/v1?label=Product&message=Analytics&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=GMS&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=%3D%202.5.0.4-R7%20and%20earlier%20versions%20&color=brighgreen)
![](https://img.shields.io/static/v1?label=Version&message=%3D%209.3.2-SP1%20and%20earlier%20versions%20&color=brighgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20('OS%20Command%20Injection')&color=brighgreen)
### Description
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') vulnerability in SonicWall GMS, SonicWall Analytics enables an authenticated attacker to execute arbitrary code with root privileges. This issue affects GMS: 9.3.2-SP1 and earlier versions; Analytics: 2.5.0.4-R7 and earlier versions.
### POC
#### Reference
- http://packetstormsecurity.com/files/174571/Sonicwall-GMS-9.9.9320-Remote-Code-Execution.html
#### Github
2024-08-05 18:41:32 +00:00
- https://github.com/nitish778191/fitness_app
2024-05-25 21:48:12 +02:00