A Host Header Redirection vulnerability in SonicOS potentially allows a remote attacker to redirect firewall management users to arbitrary web domains.
References
Link | Resource |
---|---|
http://packetstormsecurity.com/files/164502/Sonicwall-SonicOS-7.0-Host-Header-Injection.html | Exploit Third Party Advisory VDB Entry |
https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2021-0019 | Vendor Advisory |
http://packetstormsecurity.com/files/164502/Sonicwall-SonicOS-7.0-Host-Header-Injection.html | Exploit Third Party Advisory VDB Entry |
https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2021-0019 | Vendor Advisory |
Configurations
Configuration 1 (hide)
AND |
|
Configuration 2 (hide)
AND |
|
Configuration 3 (hide)
AND |
|
Configuration 4 (hide)
AND |
|
Configuration 5 (hide)
AND |
|
Configuration 6 (hide)
AND |
|
Configuration 7 (hide)
AND |
|
History
No history.
Information
Published : 2021-10-12 23:15
Updated : 2024-11-21 05:45
NVD link : CVE-2021-20031
Mitre link : CVE-2021-20031
CVE.ORG link : CVE-2021-20031
JSON object : View
Products Affected
sonicwall
- nsa_9450
- tz470w
- supermassive_9800
- nsa_9250
- tz400w
- supermassive_9400
- supermassive_e10400
- supermassive_e10800
- nsv_300
- tz600
- nsa_6700
- nssp_12400
- nsa_2700
- sonicos
- nsa_9650
- nsv_400
- tz400
- tz500w
- soho_250w
- nsa_4700
- nssp_13700
- supermassive_9200
- nsa_3700
- nssp_12800
- nsa_5650
- tz600p
- tz570
- nssp_15700
- tz270w
- nsv_470
- supermassive_e10200
- nsa_4650
- tz570w
- tz270
- tz300w
- tz670
- tz470
- tz370
- tz570p
- nsv_100
- nsv_270
- nsv_200
- tz300p
- supermassive_9600
- nsv_870
- nsa_3650
- tz500
- tz300
- nsa_2650
- nsv_25
- nsv_800
- soho_250
- nsv_10
- nsa_6650
- tz350
- nsv_1600
- tz350w
- tz370w
- nsv_50
CWE
CWE-601
URL Redirection to Untrusted Site ('Open Redirect')