From f05e7364ca06e77a080464696f1b4a4e055eba03 Mon Sep 17 00:00:00 2001 From: GitHub Action Date: Wed, 20 Oct 2021 22:40:20 +0000 Subject: [PATCH] Auto Generated CVE annotations [Wed Oct 20 22:40:20 UTC 2021] :robot: --- cves/2021/CVE-2021-20031.yaml | 7 ++++++- 1 file changed, 6 insertions(+), 1 deletion(-) diff --git a/cves/2021/CVE-2021-20031.yaml b/cves/2021/CVE-2021-20031.yaml index 97ff54f001..2dc86669e2 100644 --- a/cves/2021/CVE-2021-20031.yaml +++ b/cves/2021/CVE-2021-20031.yaml @@ -3,7 +3,7 @@ id: CVE-2021-20031 info: name: Sonicwall SonicOS 7.0 - Host Header Injection author: gy741 - severity: low + severity: medium description: A Host Header Injection vulnerability may allow an attacker to spoof a particular Host header, allowing the attacker to render arbitrary links that point to a malicious website with poisoned Host header webpages. An issue was discovered in Sonicwall NAS, SonicWall Analyzer version 8.5.0 (may be affected on other versions too). The values of the 'Host' headers are implicitly set as trusted while this should be forbidden, leading to potential host header injection attack and also the affected hosts can be used for domain fronting. This means affected hosts can be used by attackers to hide behind during various other attack reference: - https://www.exploit-db.com/exploits/50414 @@ -11,6 +11,11 @@ info: metadata: google-dork: inurl:"auth.html" intitle:"SonicWall" tags: cve,cve2021,sonicwall,redirect + classification: + cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N + cvss-score: 6.10 + cve-id: CVE-2021-20031 + cwe-id: CWE-601 requests: - raw: