Merge pull request #2910 from gy741/rule-add-v65

Create CVE-2021-20031.yaml
patch-1
Prince Chaddha 2021-10-19 18:23:40 +05:30 committed by GitHub
commit 10ebb22fb8
No known key found for this signature in database
GPG Key ID: 4AEE18F83AFDEB23
1 changed files with 32 additions and 0 deletions

View File

@ -0,0 +1,32 @@
id: CVE-2021-20031
info:
name: Sonicwall SonicOS 7.0 - Host Header Injection
author: gy741
severity: low
description: A Host Header Injection vulnerability may allow an attacker to spoof a particular Host header, allowing the attacker to render arbitrary links that point to a malicious website with poisoned Host header webpages. An issue was discovered in Sonicwall NAS, SonicWall Analyzer version 8.5.0 (may be affected on other versions too). The values of the 'Host' headers are implicitly set as trusted while this should be forbidden, leading to potential host header injection attack and also the affected hosts can be used for domain fronting. This means affected hosts can be used by attackers to hide behind during various other attack
reference:
- https://www.exploit-db.com/exploits/50414
- https://nvd.nist.gov/vuln/detail/CVE-2021-20031
metadata:
google-dork: inurl:"auth.html" intitle:"SonicWall"
tags: cve,cve2021,sonicwall,redirect
requests:
- raw:
- |
GET / HTTP/1.1
Host: {{randstr}}.tld
matchers-condition: and
matchers:
- type: word
words:
- 'https://{{randstr}}.tld/auth.html'
- 'Please be patient as you are being re-directed'
part: body
condition: and
- type: status
status:
- 200