Описание
A Stack-based buffer overflow vulnerability in SMA100 Apache httpd server's mod_cgi module environment variables allows a remote unauthenticated attacker to potentially execute code as a 'nobody' user in the appliance. This vulnerability affected SMA 200, 210, 400, 410 and 500v appliances firmware 10.2.0.8-37sv, 10.2.1.1-19sv, 10.2.1.2-24sv and earlier versions.
A Stack-based buffer overflow vulnerability in SMA100 Apache httpd server's mod_cgi module environment variables allows a remote unauthenticated attacker to potentially execute code as a 'nobody' user in the appliance. This vulnerability affected SMA 200, 210, 400, 410 and 500v appliances firmware 10.2.0.8-37sv, 10.2.1.1-19sv, 10.2.1.2-24sv and earlier versions.
Ссылки
- https://nvd.nist.gov/vuln/detail/CVE-2021-20038
- https://github.com/jbaines-r7/badblood
- https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2021-0026
- https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2021-20038
- https://www.rapid7.com/blog/post/2022/01/11/cve-2021-20038-42-sonicwall-sma-100-multiple-vulnerabilities-fixed-2
Связанные уязвимости
A Stack-based buffer overflow vulnerability in SMA100 Apache httpd server's mod_cgi module environment variables allows a remote unauthenticated attacker to potentially execute code as a 'nobody' user in the appliance. This vulnerability affected SMA 200, 210, 400, 410 and 500v appliances firmware 10.2.0.8-37sv, 10.2.1.1-19sv, 10.2.1.2-24sv and earlier versions.
Уязвимость модуля для HTTP-сервера Apache mod_cgi микропрограммного обеспечения межсетевых экранов SonicWall серий SMA 100, SMA 200, SMA 210, SMA 400, SMA 410 и SMA 500vl, позволяющая нарушителю выполнить произвольный код