Four previously unknown vulnerabilities were found in the Dell SonicWALL Email Security virtual appliance app by researchers at Digital Defense Inc. Les chercheurs ont détecté les défauts tout en développant de nouveaux modules d'audit pour sa technologie d'analyse de vulnérabilité brevetée. The flaws should be addressed immediately because of the easily accessible web interface on internet or intranet-connected application for the app. En outre, there’s a potential for unauthorized individuals to access sensitive information.
The Dell SonicWALL Email Security platform can be configured as a Mail Transfer Agent (MTA) or SMTP proxy and with spam protection, compliance scanning, anti-malware and anti-virus capabilities.
What’s the Impact of the Flaws in Dell SonicWALL Email Security platform?
If these vulnerabilities end up being exploited in the wild, worst case scenario is sensitive data disclosure of admin account password hash, arbitrary OS command execution and file deletion as ROOT. Finalement, the scenario would end with complete compromise of the appliance.
Heureusement, Dell has already addressed the vulnerabilities in a rollup patch 8.3.2 for the SonicWALL Email Security platform. The patch has been available to customers since October 3, 2016.
Here is a short resume of all four vulnerabilities:
- Authentication Bypass in DLoadReportsServlet
- Authenticated XML External Entity Injection in known_network_data_import.html
- Authenticated Remote Command Execution in manage_ftpprofile.html
- Authenticated Arbitrary File Deletion in policy_dictionary.html
Impact: Sensitive information disclosure including config files and the SHA1 password hash for the admin account.
Impact: Information disclosure.
Impact: Arbitrary OS command execution as root, full compromise of the virtual appliance.
Impact: Deletion of arbitrary files with root privileges, déni de service.