First published: Thu Jul 13 2023(Updated: )
Improper limitation of a pathname to a restricted directory ('Path Traversal') vulnerability in SonicWall GMS and Analytics allows an authenticated remote attacker to traverse the directory and extract arbitrary files using Zip Slip method to any location on the underlying filesystem with root privileges. This issue affects GMS: 9.3.2-SP1 and earlier versions; Analytics: 2.5.0.4-R7 and earlier versions.
Credit: PSIRT@sonicwall.com PSIRT@sonicwall.com
Affected Software | Affected Version | How to fix |
---|---|---|
SonicWall Analytics | <=2.5.0.4-r7 | |
SonicWALL Global Management System | <9.3.2 | |
SonicWALL Global Management System | =9.3.2 | |
SonicWALL Global Management System | =9.3.2-sp1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this vulnerability is CVE-2023-34129.
The severity of CVE-2023-34129 is high, with a severity value of 8.8.
The affected software for CVE-2023-34129 includes SonicWall Global Management System versions up to 9.3.2 and SonicWall Analytics versions up to 2.5.0.4-r7.
CVE-2023-34129 is a 'Path Traversal' vulnerability that allows an authenticated remote attacker to traverse the directory and extract arbitrary files using the Zip Slip method.
Yes, a fix is available for CVE-2023-34129. Please refer to the referenced links for more information on the fix.