- Description
- A stored cross-site scripting (XSS) vulnerability exists in the SonicOS SSLVPN web interface. A remote unauthenticated attacker is able to store and potentially execute arbitrary JavaScript code in the firewall SSLVPN portal. This vulnerability affected SonicOS Gen 5 version 5.9.1.7, 5.9.1.13, Gen 6 version 6.5.4.7, 6.5.1.12, 6.0.5.3, SonicOSv 6.5.4.v and Gen 7 version SonicOS 7.0.0.0.
- Source
- PSIRT@sonicwall.com
- NVD status
- Analyzed
CVSS 3.1
- Type
- Primary
- Base score
- 6.1
- Impact score
- 2.7
- Exploitability score
- 2.8
- Vector string
- CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
- Severity
- MEDIUM
CVSS 2.0
- Type
- Primary
- Base score
- 4.3
- Impact score
- 2.9
- Exploitability score
- 8.6
- Vector string
- AV:N/AC:M/Au:N/C:N/I:P/A:N
- Hype score
- Not currently trending
[
{
"nodes": [
{
"negate": false,
"cpeMatch": [
{
"criteria": "cpe:2.3:o:sonicwall:sonicos:*:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "FF2C3009-7B05-41B3-849E-DFBB8C79968D",
"versionEndIncluding": "5.9.1.13"
},
{
"criteria": "cpe:2.3:o:sonicwall:sonicos:*:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "0A2C8637-5089-4B5A-8458-67D097CF5BEA",
"versionEndIncluding": "6.0.5.3",
"versionStartIncluding": "6.0.0.0"
},
{
"criteria": "cpe:2.3:o:sonicwall:sonicos:*:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "08DF961E-08DD-47EC-9AB1-3A3FF79E1F7A",
"versionEndIncluding": "6.5.1.11",
"versionStartIncluding": "6.5.0.0"
},
{
"criteria": "cpe:2.3:o:sonicwall:sonicos:*:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "8302038F-FA49-4CF2-B064-3EE1103B99F1",
"versionEndIncluding": "6.5.4.7",
"versionStartIncluding": "6.5.4.0"
},
{
"criteria": "cpe:2.3:o:sonicwall:sonicos:7.0.0.0:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "05C0300F-44AB-482C-BA6D-B9F2ED77037A"
},
{
"criteria": "cpe:2.3:o:sonicwall:sonicosv:*:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "8BBB86A1-803B-4B76-BF3D-4A9BCC5AD302",
"versionEndIncluding": "6.5.4.4"
}
],
"operator": "OR"
}
]
}
]