var-202109-0375
Vulnerability from variot
Improper neutralization of special elements in the SMA100 management interface allows a remote authenticated attacker to inject arbitrary commands as a 'nobody' user which potentially leads to DoS. Pillow is a Python-based image processing library. There is currently no information about this vulnerability, please feel free to follow CNNVD or manufacturer announcements. Sonicwall SMA100 is a security access gateway device of American Sonicwall Company. An operating system command injection vulnerability exists in the SonicWall SMA100 series due to improper input validation in the SMA100 management interface
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202109-0375", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "sma 500v", "scope": "gte", "trust": 1.0, "vendor": "sonicwall", "version": "10.2.0.0" }, { "model": "sma 210", "scope": "lte", "trust": 1.0, "vendor": "sonicwall", "version": "10.2.1.0-17sv" }, { "model": "sma 400", "scope": "lte", "trust": 1.0, "vendor": "sonicwall", "version": "10.2.0.7-34sv" }, { "model": "sma 200", "scope": "lte", "trust": 1.0, "vendor": "sonicwall", "version": "10.2.0.7-34sv" }, { "model": "sma 200", "scope": "lte", "trust": 1.0, "vendor": "sonicwall", "version": "9.0.0.10-28sv" }, { "model": "sma 400", "scope": "lte", "trust": 1.0, "vendor": "sonicwall", "version": "9.0.0.10-28sv" }, { "model": "sma 500v", "scope": "lte", "trust": 1.0, "vendor": "sonicwall", "version": "10.2.1.0-17sv" }, { "model": "sma 410", "scope": "gte", "trust": 1.0, "vendor": "sonicwall", "version": "10.2.0.0" }, { "model": "sma 410", "scope": "lte", "trust": 1.0, "vendor": "sonicwall", "version": "10.2.1.0-17sv" }, { "model": "sma 410", "scope": "gte", "trust": 1.0, "vendor": "sonicwall", "version": "10.2.1.0" }, { "model": "sma 210", "scope": "lte", "trust": 1.0, "vendor": "sonicwall", "version": "10.2.0.7-34sv" }, { "model": "sma 210", "scope": "lte", "trust": 1.0, "vendor": "sonicwall", "version": "9.0.0.10-28sv" }, { "model": "sma 400", "scope": "gte", "trust": 1.0, "vendor": "sonicwall", "version": "10.2.0.0" }, { "model": "sma 500v", "scope": "lte", "trust": 1.0, "vendor": "sonicwall", "version": "10.2.0.7-34sv" }, { "model": "sma 500v", "scope": "lte", "trust": 1.0, "vendor": "sonicwall", "version": "9.0.0.10-28sv" }, { "model": "sma 210", "scope": "gte", "trust": 1.0, "vendor": "sonicwall", "version": "10.2.0.0" }, { "model": "sma 200", "scope": "gte", "trust": 1.0, "vendor": "sonicwall", "version": "10.2.1.0" }, { "model": "sma 200", "scope": "lte", "trust": 1.0, "vendor": "sonicwall", "version": "10.2.1.0-17sv" }, { "model": "sma 210", "scope": "gte", "trust": 1.0, "vendor": "sonicwall", "version": "10.2.1.0" }, { "model": "sma 400", "scope": "gte", "trust": 1.0, "vendor": "sonicwall", "version": "10.2.1.0" }, { "model": "sma 200", "scope": "gte", "trust": 1.0, "vendor": "sonicwall", "version": "10.2.0.0" }, { "model": "sma 400", "scope": "lte", "trust": 1.0, "vendor": "sonicwall", "version": "10.2.1.0-17sv" }, { "model": "sma 410", "scope": "lte", "trust": 1.0, "vendor": "sonicwall", "version": "9.0.0.10-28sv" }, { "model": "sma 410", "scope": "lte", "trust": 1.0, "vendor": "sonicwall", "version": "10.2.0.7-34sv" }, { "model": "sma 500v", "scope": "gte", "trust": 1.0, "vendor": "sonicwall", "version": "10.2.1.0" } ], "sources": [ { "db": "NVD", "id": "CVE-2021-20035" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:sonicwall:sma_200_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "9.0.0.10-28sv", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:sonicwall:sma_200_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "10.2.0.7-34sv", "versionStartIncluding": "10.2.0.0", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:sonicwall:sma_200_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "10.2.1.0-17sv", "versionStartIncluding": "10.2.1.0", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:sonicwall:sma_200:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:sonicwall:sma_210_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "9.0.0.10-28sv", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:sonicwall:sma_210_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "10.2.0.7-34sv", "versionStartIncluding": "10.2.0.0", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:sonicwall:sma_210_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "10.2.1.0-17sv", "versionStartIncluding": "10.2.1.0", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:sonicwall:sma_210:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:sonicwall:sma_400_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "9.0.0.10-28sv", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:sonicwall:sma_400_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "10.2.0.7-34sv", "versionStartIncluding": "10.2.0.0", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:sonicwall:sma_400_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "10.2.1.0-17sv", "versionStartIncluding": "10.2.1.0", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:sonicwall:sma_400:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:sonicwall:sma_410_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "9.0.0.10-28sv", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:sonicwall:sma_410_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "10.2.0.7-34sv", "versionStartIncluding": "10.2.0.0", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:sonicwall:sma_410_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "10.2.1.0-17sv", "versionStartIncluding": "10.2.1.0", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:sonicwall:sma_410:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:sonicwall:sma_500v:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "9.0.0.10-28sv", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sonicwall:sma_500v:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "10.2.0.7-34sv", "versionStartIncluding": "10.2.0.0", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sonicwall:sma_500v:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "10.2.1.0-17sv", "versionStartIncluding": "10.2.1.0", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2021-20035" } ] }, "cve": "CVE-2021-20035", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "author": "NVD", "availabilityImpact": "COMPLETE", "baseScore": 6.8, "confidentialityImpact": "NONE", "exploitabilityScore": 8.0, "impactScore": 6.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:S/C:N/I:N/A:C", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "author": "VULHUB", "availabilityImpact": "COMPLETE", "baseScore": 6.8, "confidentialityImpact": "NONE", "exploitabilityScore": 8.0, "id": "VHN-377654", "impactScore": 6.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:S/C:N/I:N/A:C", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "exploitabilityScore": 2.8, "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" } ], "severity": [ { "author": "NVD", "id": "CVE-2021-20035", "trust": 1.0, "value": "MEDIUM" }, { "author": "CNNVD", "id": "CNNVD-202104-975", "trust": 0.6, "value": "MEDIUM" }, { "author": "CNNVD", "id": "CNNVD-202109-1662", "trust": 0.6, "value": "MEDIUM" }, { "author": "VULHUB", "id": "VHN-377654", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-377654" }, { "db": "NVD", "id": "CVE-2021-20035" }, { "db": "CNNVD", "id": "CNNVD-202104-975" }, { "db": "CNNVD", "id": "CNNVD-202109-1662" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Improper neutralization of special elements in the SMA100 management interface allows a remote authenticated attacker to inject arbitrary commands as a \u0027nobody\u0027 user which potentially leads to DoS. Pillow is a Python-based image processing library. \nThere is currently no information about this vulnerability, please feel free to follow CNNVD or manufacturer announcements. Sonicwall SMA100 is a security access gateway device of American Sonicwall Company. An operating system command injection vulnerability exists in the SonicWall SMA100 series due to improper input validation in the SMA100 management interface", "sources": [ { "db": "NVD", "id": "CVE-2021-20035" }, { "db": "CNNVD", "id": "CNNVD-202104-975" }, { "db": "VULHUB", "id": "VHN-377654" }, { "db": "VULMON", "id": "CVE-2021-20035" } ], "trust": 1.62 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-20035", "trust": 1.8 }, { "db": "CNNVD", "id": "CNNVD-202109-1662", "trust": 0.7 }, { "db": "CS-HELP", "id": "SB2021041363", "trust": 0.6 }, { "db": "CNNVD", "id": "CNNVD-202104-975", "trust": 0.6 }, { "db": "CS-HELP", "id": "SB2021092405", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-377654", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2021-20035", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-377654" }, { "db": "VULMON", "id": "CVE-2021-20035" }, { "db": "NVD", "id": "CVE-2021-20035" }, { "db": "CNNVD", "id": "CNNVD-202104-975" }, { "db": "CNNVD", "id": "CNNVD-202109-1662" } ] }, "id": "VAR-202109-0375", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-377654" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T11:53:21.555000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Sonicwall SMA100 Fixes for operating system command injection vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=164753" } ], "sources": [ { "db": "CNNVD", "id": "CNNVD-202109-1662" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-78", "trust": 1.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-377654" }, { "db": "NVD", "id": "CVE-2021-20035" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.8, "url": "https://psirt.global.sonicwall.com/vuln-detail/snwlid-2021-0022" }, { "trust": 0.6, "url": "https://www.cybersecurity-help.cz/vdb/sb2021041363" }, { "trust": 0.6, "url": "https://www.cybersecurity-help.cz/vdb/sb2021092405" }, { "trust": 0.6, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-20035" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "VULHUB", "id": "VHN-377654" }, { "db": "VULMON", "id": "CVE-2021-20035" }, { "db": "NVD", "id": "CVE-2021-20035" }, { "db": "CNNVD", "id": "CNNVD-202104-975" }, { "db": "CNNVD", "id": "CNNVD-202109-1662" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-377654" }, { "db": "VULMON", "id": "CVE-2021-20035" }, { "db": "NVD", "id": "CVE-2021-20035" }, { "db": "CNNVD", "id": "CNNVD-202104-975" }, { "db": "CNNVD", "id": "CNNVD-202109-1662" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-09-27T00:00:00", "db": "VULHUB", "id": "VHN-377654" }, { "date": "2021-09-27T00:00:00", "db": "VULMON", "id": "CVE-2021-20035" }, { "date": "2021-09-27T18:15:08.383000", "db": "NVD", "id": "CVE-2021-20035" }, { "date": "2021-04-13T00:00:00", "db": "CNNVD", "id": "CNNVD-202104-975" }, { "date": "2021-09-24T00:00:00", "db": "CNNVD", "id": "CNNVD-202109-1662" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-10-06T00:00:00", "db": "VULHUB", "id": "VHN-377654" }, { "date": "2021-09-28T00:00:00", "db": "VULMON", "id": "CVE-2021-20035" }, { "date": "2021-10-06T17:29:36.947000", "db": "NVD", "id": "CVE-2021-20035" }, { "date": "2021-04-14T00:00:00", "db": "CNNVD", "id": "CNNVD-202104-975" }, { "date": "2021-10-08T00:00:00", "db": "CNNVD", "id": "CNNVD-202109-1662" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202109-1662" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Pillow Buffer error vulnerability", "sources": [ { "db": "CNNVD", "id": "CNNVD-202104-975" } ], "trust": 0.6 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202104-975" } ], "trust": 0.6 } }
Loading...
Loading...
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.