cve/2023/CVE-2023-34133.md

20 lines
1.2 KiB
Markdown
Raw Normal View History

2024-05-25 21:48:12 +02:00
### [CVE-2023-34133](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-34133)
![](https://img.shields.io/static/v1?label=Product&message=Analytics&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=GMS&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=%3D%202.5.0.4-R7%20and%20earlier%20versions%20&color=brighgreen)
![](https://img.shields.io/static/v1?label=Version&message=%3D%209.3.2-SP1%20and%20earlier%20versions%20&color=brighgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20('SQL%20Injection')&color=brighgreen)
### Description
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in SonicWall GMS and Analytics allows an unauthenticated attacker to extract sensitive information from the application database. This issue affects GMS: 9.3.2-SP1 and earlier versions; Analytics: 2.5.0.4-R7 and earlier versions.
### POC
#### Reference
- http://packetstormsecurity.com/files/174571/Sonicwall-GMS-9.9.9320-Remote-Code-Execution.html
#### Github
2024-08-05 18:41:32 +00:00
- https://github.com/nitish778191/fitness_app
2024-05-25 21:48:12 +02:00