‘SonicWALL Content-Filtering Universal Script Injection Vulnerability’
Summary
‘
Credit:
‘The information has been provided by The Zero Day Initiative (ZDI).
The original article can be found at: SonicWALL Pro 2040‘
Details
‘Vulnerable Systems:
* SonicWALL Pro 2040 version 4.0.1
Immune Systems:
* SonicWALL Pro 2040 version 4.0.1.1
The specific flaw exists in the default error page displayed when a user requests access to a web site that is blocked based on the devices content-filtering rules. Insufficient sanity checks allow an attacker to craft a URL that will trigger an error and simultaneously inject a malicious script. As the browser is unable to differentiate between content delivered from the original top level site requested and the inline device, the script injection occurs under the context of the target domain. This can result in various further compromise.
Vendor Response:
SonicWALL has issued an update to correct this vulnerability. More details can be found at:
http://www.sonicwall.com/downloads/SonicOS_Enhanced_4.0.1.1_Release_Notes.pdf
Disclosure Timeline:
2008-06-25 – Vulnerability reported to vendor
2008-10-30 – Coordinated public release of advisory’