First published: Wed Feb 22 2017(Updated: )
The SonicWall Secure Remote Access server (version 8.1.0.2-14sv) is vulnerable to a Remote Command Injection vulnerability in its web administrative interface. This vulnerability occurs in the 'extensionsettings' CGI (/cgi-bin/extensionsettings) component responsible for handling some of the server's internal configurations. The CGI application doesn't properly escape the information it's passed when processing a particular multi-part form request involving scripts. The filename of the 'scriptname' variable is read in unsanitized before a call to system() is performed - allowing for remote command injection. Exploitation of this vulnerability yields shell access to the remote machine under the nobody user account. This is SonicWall Issue ID 181195.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
SonicWall Secure Remote Access | =8.1.0.2-14sv |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2016-9683 is classified as a high-severity vulnerability due to its potential for remote command injection.
To mitigate CVE-2016-9683, upgrade the SonicWall Secure Remote Access server to a patched version that addresses this vulnerability.
CVE-2016-9683 affects the web administrative interface, specifically the 'extensionsettings' CGI component.
Yes, given its nature as a remote command injection vulnerability, CVE-2016-9683 could be targeted by attackers if not addressed.
CVE-2016-9683 specifically affects SonicWall Secure Remote Access Server version 8.1.0.2-14sv.