{"vuid":"VU#404051","idnumber":"404051","name":"Dell SonicWALL Scrutinizer SQL injection vulnerability","keywords":["sql","sqli","injection","dell","sonicwall","scrutinizer"],"overview":"Dell SonicWALL Scrutinizer 9.5.0 and older versions contain a SQL injection vulnerability.","clean_desc":"The Dell SonicWALL service bulletin states: \"After the release of Dell SonicWALL Scrutinizer 9.5.0, we received a report of an issue whereby a Scrutinizer user who had already authenticated to the product could manipulate a certain URL to run SQL commands against the Scrutinizer database. Error output was also displayed which provided debug information detailing the query being run. While the risk to most Scrutinizer installations was low, we decided to proactively publish a patched update to fix this vulnerability in the form of Scrutinizer 9.5.2.\" Additional details may be found in the full Dell SonicWALL service bulletin. [PDF]","impact":"A remote authenticated attacker may be able to run arbitrary SQL commands and exfiltrate sensitive data.","resolution":"Apply an Update The Dell SonicWALL service bulletin states: \"We recommend existing users of Dell SonicWALL Scrutinizer 9.5.0 and earlier versions upgrade to version 9.5.2 to prevent unauthorized queries from being run via the URL by authenticated users. Version 9.5.2 is available for download from www.mysonicwall.com. Users should log onto mySonicWALL and click on Downloads > Download Center in the navigation panel on the left, then select “Scrutinizer Software” in the Software Type drop down menu.\"","workarounds":"","sysaffected":"","thanks":"Thanks to Offensive Security for reporting this vulnerability.","author":"This document was written by Jared Allar.","public":["h","t","t","p",":","/","/","w","w","w",".","s","o","n","i","c","w","a","l","l",".","c","o","m","/","s","h","a","r","e","d","/","d","o","w","n","l","o","a","d","/","D","e","l","l","_","S","o","n","i","c","W","A","L","L","_","S","c","r","u","t","i","n","i","z","e","r","_","S","e","r","v","i","c","e","_","B","u","l","l","e","t","i","n","_","f","o","r","_","S","Q","L","_","i","n","j","e","c","t","i","o","n","_","v","u","l","n","e","r","a","b","i","l","i","t","y","_","C","V","E",".","p","d","f"],"cveids":["CVE-2012-2962"],"certadvisory":"","uscerttechnicalalert":null,"datecreated":"2012-06-12T19:49:53Z","publicdate":"2012-07-20T00:00:00Z","datefirstpublished":"2012-07-25T17:46:45Z","dateupdated":"2013-05-15T19:27:48Z","revision":17,"vrda_d1_directreport":"1","vrda_d1_population":"3","vrda_d1_impact":"3","cam_widelyknown":"0","cam_exploitation":"0","cam_internetinfrastructure":"0","cam_population":"0","cam_impact":"0","cam_easeofexploitation":"0","cam_attackeraccessrequired":"0","cam_scorecurrent":"0","cam_scorecurrentwidelyknown":"0","cam_scorecurrentwidelyknownexploited":"0","ipprotocol":"","cvss_accessvector":"N","cvss_accesscomplexity":"L","cvss_authentication":null,"cvss_confidentialityimpact":"P","cvss_integrityimpact":"P","cvss_availabilityimpact":"P","cvss_exploitablity":null,"cvss_remediationlevel":"OF","cvss_reportconfidence":"C","cvss_collateraldamagepotential":"ND","cvss_targetdistribution":"ND","cvss_securityrequirementscr":"ND","cvss_securityrequirementsir":"ND","cvss_securityrequirementsar":"ND","cvss_basescore":"6.5","cvss_basevector":"AV:N/AC:L/Au:S/C:P/I:P/A:P","cvss_temporalscore":"5.4","cvss_environmentalscore":"5.4","cvss_environmentalvector":"CDP:ND/TD:ND/CR:ND/IR:ND/AR:ND","metric":0.0,"vulnote":null}