Advisory Details

October 30th, 2008

SonicWALL Content-Filtering Universal Script Injection Vulnerability

ZDI-08-070
ZDI-CAN-350

CVE ID CVE-2008-4918
CVSS SCORE
AFFECTED VENDORS SonicWALL
AFFECTED PRODUCTS Pro 2040
TIPPINGPOINT™ IPS CUSTOMER PROTECTION TippingPoint IPS customers are protected against this vulnerability by Digital Vaccine protection filter ID 2023, 3886. For further product information on the TippingPoint IPS: http://www.tippingpoint.com
VULNERABILITY DETAILS

This vulnerability allows remote attackers to execute a script injection attack on arbitrary sites through vulnerable installations of SonicWALL. User interaction is required to exploit this vulnerability in that the target must visit a malicious web page or open a malicious web link.

The specific flaw exists in the default error page displayed when a user requests access to a web site that is blocked based on the devices content-filtering rules. Insufficient sanity checks allow an attacker to craft a URL that will trigger an error and simultaneously inject a malicious script. As the browser is unable to differentiate between content delivered from the original top level site requested and the inline device, the script injection occurs under the context of the target domain. This can result in various further compromise.

VENDOR RESPONSE SonicWALL has issued an update to correct this vulnerability. More details can be found at:
http://www.sonicwall.com/downloads/SonicOS_Enhanced_4.0.1.1_Release_Notes.pdf
DISCLOSURE TIMELINE
  • 2008-06-25 - Vulnerability reported to vendor
  • 2008-10-30 - Coordinated public release of advisory
CREDIT Adrian 'pagvac' Pastor | GNUCITIZEN | www.gnucitizen.org
BACK TO ADVISORIES