First published: Mon Oct 12 2020(Updated: )
A stored cross-site scripting (XSS) vulnerability exists in the SonicOS SSLVPN web interface. A remote unauthenticated attacker is able to store and potentially execute arbitrary JavaScript code in the firewall SSLVPN portal. This vulnerability affected SonicOS Gen 5 version 5.9.1.7, 5.9.1.13, Gen 6 version 6.5.4.7, 6.5.1.12, 6.0.5.3, SonicOSv 6.5.4.v and Gen 7 version SonicOS 7.0.0.0.
Credit: PSIRT@sonicwall.com
Affected Software | Affected Version | How to fix |
---|---|---|
SonicWall SonicOS | <=5.9.1.13 | |
SonicWall SonicOS | >=6.0.0.0<=6.0.5.3 | |
SonicWall SonicOS | >=6.5.0.0<=6.5.1.11 | |
SonicWall SonicOS | >=6.5.4.0<=6.5.4.7 | |
SonicWall SonicOS | =7.0.0.0 | |
Sonicwall Sonicosv | <=6.5.4.4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-5142 is a stored cross-site scripting (XSS) vulnerability that exists in the SonicOS SSLVPN web interface.
A remote unauthenticated attacker can store and potentially execute arbitrary JavaScript code in the firewall SSLVPN portal.
SonicOS Gen 5 versions 5.9.1.7 and 5.9.1.13, as well as SonicOS Gen 6 versions between 6.0.0.0 and 6.0.5.3, SonicOS Gen 6.5 versions between 6.5.0.0 and 6.5.1.11, SonicOS Gen 6.5 version 6.5.4.0 through 6.5.4.7, and SonicOS Gen 7 version 7.0.0.0 are affected.
CVE-2020-5142 has a severity rating of 6.1 (medium).
Upgrade to a fixed version of SonicOS. Refer to the vendor's advisory for more information: [link](https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2020-0017).