Vulnerabilites related to sophos - sfos
cve-2017-18014
Vulnerability from cvelistv5
Published
2018-01-12 17:00
Modified
2024-08-05 21:06
Severity ?
EPSS score ?
Summary
An NC-25986 issue was discovered in the Logging subsystem of Sophos XG Firewall with SFOS before 17.0.3 MR3. An unauthenticated user can trigger a persistent XSS vulnerability found in the WAF log page (Control Center -> Log Viewer -> in the filter option "Web Server Protection") in the webadmin interface, and execute any action available to the webadmin of the firewall (e.g., creating a new user, enabling SSH, or adding an SSH authorized key). The WAF log page will execute the "User-Agent" parameter in the HTTP POST request.
References
▼ | URL | Tags |
---|---|---|
https://community.sophos.com/products/xg-firewall/b/xg-blog/posts/sfos-17-0-3-mr3-released | x_refsource_CONFIRM | |
http://seclists.org/fulldisclosure/2018/Jan/24 | mailing-list, x_refsource_FULLDISC | |
https://community.sophos.com/kb/en-us/128024 | x_refsource_CONFIRM | |
https://blogs.securiteam.com/index.php/archives/3612 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T21:06:50.119Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://community.sophos.com/products/xg-firewall/b/xg-blog/posts/sfos-17-0-3-mr3-released" }, { "name": "20180109 SSD Advisory - Sophos XG from Unauthenticated Persistent XSS to Unauthorized Root Access", "tags": [ "mailing-list", "x_refsource_FULLDISC", "x_transferred" ], "url": "http://seclists.org/fulldisclosure/2018/Jan/24" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://community.sophos.com/kb/en-us/128024" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://blogs.securiteam.com/index.php/archives/3612" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2017-12-20T00:00:00", "descriptions": [ { "lang": "en", "value": "An NC-25986 issue was discovered in the Logging subsystem of Sophos XG Firewall with SFOS before 17.0.3 MR3. An unauthenticated user can trigger a persistent XSS vulnerability found in the WAF log page (Control Center -\u003e Log Viewer -\u003e in the filter option \"Web Server Protection\") in the webadmin interface, and execute any action available to the webadmin of the firewall (e.g., creating a new user, enabling SSH, or adding an SSH authorized key). The WAF log page will execute the \"User-Agent\" parameter in the HTTP POST request." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-01-12T16:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://community.sophos.com/products/xg-firewall/b/xg-blog/posts/sfos-17-0-3-mr3-released" }, { "name": "20180109 SSD Advisory - Sophos XG from Unauthenticated Persistent XSS to Unauthorized Root Access", "tags": [ "mailing-list", "x_refsource_FULLDISC" ], "url": "http://seclists.org/fulldisclosure/2018/Jan/24" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://community.sophos.com/kb/en-us/128024" }, { "tags": [ "x_refsource_MISC" ], "url": "https://blogs.securiteam.com/index.php/archives/3612" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2017-18014", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "An NC-25986 issue was discovered in the Logging subsystem of Sophos XG Firewall with SFOS before 17.0.3 MR3. An unauthenticated user can trigger a persistent XSS vulnerability found in the WAF log page (Control Center -\u003e Log Viewer -\u003e in the filter option \"Web Server Protection\") in the webadmin interface, and execute any action available to the webadmin of the firewall (e.g., creating a new user, enabling SSH, or adding an SSH authorized key). The WAF log page will execute the \"User-Agent\" parameter in the HTTP POST request." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://community.sophos.com/products/xg-firewall/b/xg-blog/posts/sfos-17-0-3-mr3-released", "refsource": "CONFIRM", "url": "https://community.sophos.com/products/xg-firewall/b/xg-blog/posts/sfos-17-0-3-mr3-released" }, { "name": "20180109 SSD Advisory - Sophos XG from Unauthenticated Persistent XSS to Unauthorized Root Access", "refsource": "FULLDISC", "url": "http://seclists.org/fulldisclosure/2018/Jan/24" }, { "name": "https://community.sophos.com/kb/en-us/128024", "refsource": "CONFIRM", "url": "https://community.sophos.com/kb/en-us/128024" }, { "name": "https://blogs.securiteam.com/index.php/archives/3612", "refsource": "MISC", "url": "https://blogs.securiteam.com/index.php/archives/3612" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2017-18014", "datePublished": "2018-01-12T17:00:00", "dateReserved": "2018-01-01T00:00:00", "dateUpdated": "2024-08-05T21:06:50.119Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2018-16117
Vulnerability from cvelistv5
Published
2019-06-20 16:06
Modified
2024-08-05 10:17
Severity ?
EPSS score ?
Summary
A shell escape vulnerability in /webconsole/Controller in Admin Portal of Sophos XG firewall 17.0.8 MR-8 allow remote authenticated attackers to execute arbitrary OS commands via shell metacharacters in the "dbName" POST parameter.
References
▼ | URL | Tags |
---|---|---|
https://www.sophos.com/en-us/legal/sophos-responsible-disclosure-policy.aspx | x_refsource_MISC | |
https://github.com/klsecservices/Advisories/blob/master/KL-SOPHOS-2018-002.md | x_refsource_MISC | |
https://community.sophos.com/kb/en-us/132637 | x_refsource_CONFIRM |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T10:17:37.633Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.sophos.com/en-us/legal/sophos-responsible-disclosure-policy.aspx" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/klsecservices/Advisories/blob/master/KL-SOPHOS-2018-002.md" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://community.sophos.com/kb/en-us/132637" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "A shell escape vulnerability in /webconsole/Controller in Admin Portal of Sophos XG firewall 17.0.8 MR-8 allow remote authenticated attackers to execute arbitrary OS commands via shell metacharacters in the \"dbName\" POST parameter." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2019-06-20T16:06:13", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://www.sophos.com/en-us/legal/sophos-responsible-disclosure-policy.aspx" }, { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/klsecservices/Advisories/blob/master/KL-SOPHOS-2018-002.md" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://community.sophos.com/kb/en-us/132637" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2018-16117", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A shell escape vulnerability in /webconsole/Controller in Admin Portal of Sophos XG firewall 17.0.8 MR-8 allow remote authenticated attackers to execute arbitrary OS commands via shell metacharacters in the \"dbName\" POST parameter." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.sophos.com/en-us/legal/sophos-responsible-disclosure-policy.aspx", "refsource": "MISC", "url": "https://www.sophos.com/en-us/legal/sophos-responsible-disclosure-policy.aspx" }, { "name": "https://github.com/klsecservices/Advisories/blob/master/KL-SOPHOS-2018-002.md", "refsource": "MISC", "url": "https://github.com/klsecservices/Advisories/blob/master/KL-SOPHOS-2018-002.md" }, { "name": "https://community.sophos.com/kb/en-us/132637", "refsource": "CONFIRM", "url": "https://community.sophos.com/kb/en-us/132637" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2018-16117", "datePublished": "2019-06-20T16:06:13", "dateReserved": "2018-08-29T00:00:00", "dateUpdated": "2024-08-05T10:17:37.633Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2018-16116
Vulnerability from cvelistv5
Published
2019-06-20 16:18
Modified
2024-08-05 10:17
Severity ?
EPSS score ?
Summary
SQL injection vulnerability in AccountStatus.jsp in Admin Portal of Sophos XG firewall 17.0.8 MR-8 allow remote authenticated attackers to execute arbitrary SQL commands via the "username" GET parameter.
References
▼ | URL | Tags |
---|---|---|
https://www.sophos.com/en-us/legal/sophos-responsible-disclosure-policy.aspx | x_refsource_MISC | |
https://github.com/klsecservices/Advisories/blob/master/KL-SOPHOS-2018-001.md | x_refsource_MISC | |
https://community.sophos.com/kb/en-us/132637 | x_refsource_CONFIRM |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T10:17:38.111Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.sophos.com/en-us/legal/sophos-responsible-disclosure-policy.aspx" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/klsecservices/Advisories/blob/master/KL-SOPHOS-2018-001.md" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://community.sophos.com/kb/en-us/132637" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "SQL injection vulnerability in AccountStatus.jsp in Admin Portal of Sophos XG firewall 17.0.8 MR-8 allow remote authenticated attackers to execute arbitrary SQL commands via the \"username\" GET parameter." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2019-06-20T16:18:55", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://www.sophos.com/en-us/legal/sophos-responsible-disclosure-policy.aspx" }, { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/klsecservices/Advisories/blob/master/KL-SOPHOS-2018-001.md" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://community.sophos.com/kb/en-us/132637" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2018-16116", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "SQL injection vulnerability in AccountStatus.jsp in Admin Portal of Sophos XG firewall 17.0.8 MR-8 allow remote authenticated attackers to execute arbitrary SQL commands via the \"username\" GET parameter." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.sophos.com/en-us/legal/sophos-responsible-disclosure-policy.aspx", "refsource": "MISC", "url": "https://www.sophos.com/en-us/legal/sophos-responsible-disclosure-policy.aspx" }, { "name": "https://github.com/klsecservices/Advisories/blob/master/KL-SOPHOS-2018-001.md", "refsource": "MISC", "url": "https://github.com/klsecservices/Advisories/blob/master/KL-SOPHOS-2018-001.md" }, { "name": "https://community.sophos.com/kb/en-us/132637", "refsource": "CONFIRM", "url": "https://community.sophos.com/kb/en-us/132637" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2018-16116", "datePublished": "2019-06-20T16:18:55", "dateReserved": "2018-08-29T00:00:00", "dateUpdated": "2024-08-05T10:17:38.111Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2018-16118
Vulnerability from cvelistv5
Published
2019-06-20 16:02
Modified
2024-08-05 10:17
Severity ?
EPSS score ?
Summary
A shell escape vulnerability in /webconsole/APIController in the API Configuration component of Sophos XG firewall 17.0.8 MR-8 allows remote attackers to execute arbitrary OS commands via shell metachracters in the "X-Forwarded-for" HTTP header.
References
▼ | URL | Tags |
---|---|---|
https://www.sophos.com/en-us/legal/sophos-responsible-disclosure-policy.aspx | x_refsource_MISC | |
https://github.com/klsecservices/Advisories/blob/master/KL-SOPHOS-2018-003.md | x_refsource_MISC | |
https://community.sophos.com/kb/en-us/132637 | x_refsource_CONFIRM |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T10:17:38.154Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.sophos.com/en-us/legal/sophos-responsible-disclosure-policy.aspx" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/klsecservices/Advisories/blob/master/KL-SOPHOS-2018-003.md" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://community.sophos.com/kb/en-us/132637" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "A shell escape vulnerability in /webconsole/APIController in the API Configuration component of Sophos XG firewall 17.0.8 MR-8 allows remote attackers to execute arbitrary OS commands via shell metachracters in the \"X-Forwarded-for\" HTTP header." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2019-06-20T16:12:19", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://www.sophos.com/en-us/legal/sophos-responsible-disclosure-policy.aspx" }, { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/klsecservices/Advisories/blob/master/KL-SOPHOS-2018-003.md" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://community.sophos.com/kb/en-us/132637" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2018-16118", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A shell escape vulnerability in /webconsole/APIController in the API Configuration component of Sophos XG firewall 17.0.8 MR-8 allows remote attackers to execute arbitrary OS commands via shell metachracters in the \"X-Forwarded-for\" HTTP header." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.sophos.com/en-us/legal/sophos-responsible-disclosure-policy.aspx", "refsource": "MISC", "url": "https://www.sophos.com/en-us/legal/sophos-responsible-disclosure-policy.aspx" }, { "name": "https://github.com/klsecservices/Advisories/blob/master/KL-SOPHOS-2018-003.md", "refsource": "MISC", "url": "https://github.com/klsecservices/Advisories/blob/master/KL-SOPHOS-2018-003.md" }, { "name": "https://community.sophos.com/kb/en-us/132637", "refsource": "CONFIRM", "url": "https://community.sophos.com/kb/en-us/132637" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2018-16118", "datePublished": "2019-06-20T16:02:54", "dateReserved": "2018-08-29T00:00:00", "dateUpdated": "2024-08-05T10:17:38.154Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-0331
Vulnerability from cvelistv5
Published
2022-03-29 00:30
Modified
2024-08-02 23:25
Severity ?
EPSS score ?
Summary
An information disclosure vulnerability in Webadmin allows an unauthenticated remote attacker to read the device serial number in Sophos Firewall version v18.5 MR2 and older.
References
▼ | URL | Tags |
---|---|---|
https://www.sophos.com/en-us/security-advisories/sophos-sa-20220328-sfos-18-5-3 | x_refsource_CONFIRM |
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Sophos | Sophos Firewall |
Version: unspecified < |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T23:25:40.012Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.sophos.com/en-us/security-advisories/sophos-sa-20220328-sfos-18-5-3" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Sophos Firewall", "vendor": "Sophos", "versions": [ { "lessThanOrEqual": "18.5 MR2", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "credits": [ { "lang": "en", "value": "Mohammed Adel of Safe Decision Cybersecurity Labs" } ], "descriptions": [ { "lang": "en", "value": "An information disclosure vulnerability in Webadmin allows an unauthenticated remote attacker to read the device serial number in Sophos Firewall version v18.5 MR2 and older." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-03-29T00:30:13", "orgId": "526a354d-e866-4174-ae7d-bac848e5c4c5", "shortName": "Sophos" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.sophos.com/en-us/security-advisories/sophos-sa-20220328-sfos-18-5-3" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security-alert@sophos.com", "ID": "CVE-2022-0331", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Sophos Firewall", "version": { "version_data": [ { "version_affected": "\u003c=", "version_value": "18.5 MR2" } ] } } ] }, "vendor_name": "Sophos" } ] } }, "credit": [ { "lang": "eng", "value": "Mohammed Adel of Safe Decision Cybersecurity Labs" } ], "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "An information disclosure vulnerability in Webadmin allows an unauthenticated remote attacker to read the device serial number in Sophos Firewall version v18.5 MR2 and older." } ] }, "impact": { "cvss": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.sophos.com/en-us/security-advisories/sophos-sa-20220328-sfos-18-5-3", "refsource": "CONFIRM", "url": "https://www.sophos.com/en-us/security-advisories/sophos-sa-20220328-sfos-18-5-3" } ] } } } }, "cveMetadata": { "assignerOrgId": "526a354d-e866-4174-ae7d-bac848e5c4c5", "assignerShortName": "Sophos", "cveId": "CVE-2022-0331", "datePublished": "2022-03-29T00:30:13", "dateReserved": "2022-01-21T00:00:00", "dateUpdated": "2024-08-02T23:25:40.012Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2020-11503
Vulnerability from cvelistv5
Published
2020-06-18 15:25
Modified
2024-08-04 11:35
Severity ?
EPSS score ?
Summary
A heap-based buffer overflow in the awarrensmtp component of Sophos XG Firewall v17.5 MR11 and older potentially allows an attacker to run arbitrary code remotely.
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T11:35:12.730Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://community.sophos.com/b/security-blog/posts/advisory-potential-rce-through-heap-overflow-in-awarrensmtp-cve-2020-11503" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "A heap-based buffer overflow in the awarrensmtp component of Sophos XG Firewall v17.5 MR11 and older potentially allows an attacker to run arbitrary code remotely." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2020-06-18T15:25:29", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://community.sophos.com/b/security-blog/posts/advisory-potential-rce-through-heap-overflow-in-awarrensmtp-cve-2020-11503" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2020-11503", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A heap-based buffer overflow in the awarrensmtp component of Sophos XG Firewall v17.5 MR11 and older potentially allows an attacker to run arbitrary code remotely." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://community.sophos.com/b/security-blog/posts/advisory-potential-rce-through-heap-overflow-in-awarrensmtp-cve-2020-11503", "refsource": "CONFIRM", "url": "https://community.sophos.com/b/security-blog/posts/advisory-potential-rce-through-heap-overflow-in-awarrensmtp-cve-2020-11503" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2020-11503", "datePublished": "2020-06-18T15:25:29", "dateReserved": "2020-04-03T00:00:00", "dateUpdated": "2024-08-04T11:35:12.730Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2020-12271
Vulnerability from cvelistv5
Published
2020-04-27 04:00
Modified
2025-02-04 19:55
Severity ?
EPSS score ?
Summary
A SQL injection issue was found in SFOS 17.0, 17.1, 17.5, and 18.0 before 2020-04-25 on Sophos XG Firewall devices, as exploited in the wild in April 2020. This affected devices configured with either the administration (HTTPS) service or the User Portal exposed on the WAN zone. A successful attack may have caused remote code execution that exfiltrated usernames and hashed passwords for the local device admin(s), portal admins, and user accounts used for remote access (but not external Active Directory or LDAP passwords)
References
▼ | URL | Tags |
---|---|---|
https://cwe.mitre.org/data/definitions/89.html | x_refsource_MISC | |
https://community.sophos.com/kb/en-us/135412 | x_refsource_MISC | |
https://news.sophos.com/en-us/2020/04/26/asnarok/ | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T11:48:58.362Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://cwe.mitre.org/data/definitions/89.html" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://community.sophos.com/kb/en-us/135412" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://news.sophos.com/en-us/2020/04/26/asnarok/" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2020-12271", "options": [ { "Exploitation": "active" }, { "Automatable": "yes" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2025-02-04T19:54:52.090553Z", "version": "2.0.3" }, "type": "ssvc" } }, { "other": { "content": { "dateAdded": "2021-11-03", "reference": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog?search_api_fulltext=CVE-2020-12271" }, "type": "kev" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-89", "description": "CWE-89 Improper Neutralization of Special Elements used in an SQL Command (\u0027SQL Injection\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-02-04T19:55:10.964Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "A SQL injection issue was found in SFOS 17.0, 17.1, 17.5, and 18.0 before 2020-04-25 on Sophos XG Firewall devices, as exploited in the wild in April 2020. This affected devices configured with either the administration (HTTPS) service or the User Portal exposed on the WAN zone. A successful attack may have caused remote code execution that exfiltrated usernames and hashed passwords for the local device admin(s), portal admins, and user accounts used for remote access (but not external Active Directory or LDAP passwords)" } ], "metrics": [ { "cvssV3_0": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 10, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AC:L/AV:N/A:H/C:H/I:H/PR:N/S:C/UI:N", "version": "3.0" } } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-07-10T20:15:58.000Z", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://cwe.mitre.org/data/definitions/89.html" }, { "tags": [ "x_refsource_MISC" ], "url": "https://community.sophos.com/kb/en-us/135412" }, { "tags": [ "x_refsource_MISC" ], "url": "https://news.sophos.com/en-us/2020/04/26/asnarok/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2020-12271", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A SQL injection issue was found in SFOS 17.0, 17.1, 17.5, and 18.0 before 2020-04-25 on Sophos XG Firewall devices, as exploited in the wild in April 2020. This affected devices configured with either the administration (HTTPS) service or the User Portal exposed on the WAN zone. A successful attack may have caused remote code execution that exfiltrated usernames and hashed passwords for the local device admin(s), portal admins, and user accounts used for remote access (but not external Active Directory or LDAP passwords)" } ] }, "impact": { "cvss": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AC:L/AV:N/A:H/C:H/I:H/PR:N/S:C/UI:N", "version": "3.0" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://cwe.mitre.org/data/definitions/89.html", "refsource": "MISC", "url": "https://cwe.mitre.org/data/definitions/89.html" }, { "name": "https://community.sophos.com/kb/en-us/135412", "refsource": "MISC", "url": "https://community.sophos.com/kb/en-us/135412" }, { "name": "https://news.sophos.com/en-us/2020/04/26/asnarok/", "refsource": "MISC", "url": "https://news.sophos.com/en-us/2020/04/26/asnarok/" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2020-12271", "datePublished": "2020-04-27T04:00:01.000Z", "dateReserved": "2020-04-27T00:00:00.000Z", "dateUpdated": "2025-02-04T19:55:10.964Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-1040
Vulnerability from cvelistv5
Published
2022-03-25 12:10
Modified
2025-01-29 20:24
Severity ?
EPSS score ?
Summary
An authentication bypass vulnerability in the User Portal and Webadmin allows a remote attacker to execute code in Sophos Firewall version v18.5 MR3 and older.
References
▼ | URL | Tags |
---|---|---|
https://www.sophos.com/en-us/security-advisories/sophos-sa-20220325-sfos-rce | x_refsource_CONFIRM | |
http://packetstormsecurity.com/files/168046/Sophos-XG115w-Firewall-17.0.10-MR-10-Authentication-Bypass.html | x_refsource_MISC | |
https://www.exploit-db.com/exploits/51006 | x_refsource_MISC |
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Sophos | Sophos Firewall |
Version: unspecified < |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T23:47:43.274Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.sophos.com/en-us/security-advisories/sophos-sa-20220325-sfos-rce" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://packetstormsecurity.com/files/168046/Sophos-XG115w-Firewall-17.0.10-MR-10-Authentication-Bypass.html" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.exploit-db.com/exploits/51006" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2022-1040", "options": [ { "Exploitation": "active" }, { "Automatable": "yes" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2025-01-29T20:24:47.614244Z", "version": "2.0.3" }, "type": "ssvc" } }, { "other": { "content": { "dateAdded": "2022-03-31", "reference": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog?search_api_fulltext=CVE-2022-1040" }, "type": "kev" } } ], "problemTypes": [ { "descriptions": [ { "description": "CWE-noinfo Not enough information", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-01-29T20:24:58.196Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "Sophos Firewall", "vendor": "Sophos", "versions": [ { "lessThanOrEqual": "18.5 MR3", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "descriptions": [ { "lang": "en", "value": "An authentication bypass vulnerability in the User Portal and Webadmin allows a remote attacker to execute code in Sophos Firewall version v18.5 MR3 and older." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-09-13T20:44:02.000Z", "orgId": "526a354d-e866-4174-ae7d-bac848e5c4c5", "shortName": "Sophos" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.sophos.com/en-us/security-advisories/sophos-sa-20220325-sfos-rce" }, { "tags": [ "x_refsource_MISC" ], "url": "http://packetstormsecurity.com/files/168046/Sophos-XG115w-Firewall-17.0.10-MR-10-Authentication-Bypass.html" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.exploit-db.com/exploits/51006" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security-alert@sophos.com", "ID": "CVE-2022-1040", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Sophos Firewall", "version": { "version_data": [ { "version_affected": "\u003c=", "version_value": "18.5 MR3" } ] } } ] }, "vendor_name": "Sophos" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "An authentication bypass vulnerability in the User Portal and Webadmin allows a remote attacker to execute code in Sophos Firewall version v18.5 MR3 and older." } ] }, "impact": { "cvss": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.sophos.com/en-us/security-advisories/sophos-sa-20220325-sfos-rce", "refsource": "CONFIRM", "url": "https://www.sophos.com/en-us/security-advisories/sophos-sa-20220325-sfos-rce" }, { "name": "http://packetstormsecurity.com/files/168046/Sophos-XG115w-Firewall-17.0.10-MR-10-Authentication-Bypass.html", "refsource": "MISC", "url": "http://packetstormsecurity.com/files/168046/Sophos-XG115w-Firewall-17.0.10-MR-10-Authentication-Bypass.html" }, { "name": "https://www.exploit-db.com/exploits/51006", "refsource": "MISC", "url": "https://www.exploit-db.com/exploits/51006" } ] } } } }, "cveMetadata": { "assignerOrgId": "526a354d-e866-4174-ae7d-bac848e5c4c5", "assignerShortName": "Sophos", "cveId": "CVE-2022-1040", "datePublished": "2022-03-25T12:10:10.000Z", "dateReserved": "2022-03-21T00:00:00.000Z", "dateUpdated": "2025-01-29T20:24:58.196Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
Vulnerability from fkie_nvd
Published
2019-06-20 17:15
Modified
2024-11-21 03:52
Severity ?
Summary
A shell escape vulnerability in /webconsole/Controller in Admin Portal of Sophos XG firewall 17.0.8 MR-8 allow remote authenticated attackers to execute arbitrary OS commands via shell metacharacters in the "dbName" POST parameter.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:sophos:sfos:*:*:*:*:*:*:*:*", "matchCriteriaId": "7EF76A45-D3EB-4EF4-BA42-1B5F4232DAB9", "versionEndIncluding": "17.0", "vulnerable": true }, { "criteria": "cpe:2.3:o:sophos:sfos:17.1:-:*:*:*:*:*:*", "matchCriteriaId": "FEC949C1-A719-4835-87B6-61829D8FE171", "vulnerable": true }, { "criteria": "cpe:2.3:o:sophos:sfos:17.1:maintenance_release1:*:*:*:*:*:*", "matchCriteriaId": "EF5D2203-394D-43E8-8731-3E020987D0BE", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:sophos:xg_firewall:-:*:*:*:*:*:*:*", "matchCriteriaId": "9628D079-44BD-479E-BE63-9BEF824B4E4B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "A shell escape vulnerability in /webconsole/Controller in Admin Portal of Sophos XG firewall 17.0.8 MR-8 allow remote authenticated attackers to execute arbitrary OS commands via shell metacharacters in the \"dbName\" POST parameter." }, { "lang": "es", "value": "Una vulnerabilidad de escape de shell en /webconsole/Controller en el Portal de Administraci\u00f3n de Sophos XG firewall versi\u00f3n 17.0.8 MR-8, permite a atacantes remotos autenticados ejecutar comandos de sistema operativo arbitrarios por medio de meta caracteres shell en el par\u00e1metro POST \"dbName\"." } ], "id": "CVE-2018-16117", "lastModified": "2024-11-21T03:52:06.973", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "COMPLETE", "baseScore": 9.0, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:L/Au:S/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 8.0, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2019-06-20T17:15:10.003", "references": [ { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "https://community.sophos.com/kb/en-us/132637" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/klsecservices/Advisories/blob/master/KL-SOPHOS-2018-002.md" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "https://www.sophos.com/en-us/legal/sophos-responsible-disclosure-policy.aspx" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://community.sophos.com/kb/en-us/132637" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/klsecservices/Advisories/blob/master/KL-SOPHOS-2018-002.md" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.sophos.com/en-us/legal/sophos-responsible-disclosure-policy.aspx" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-78" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2019-06-20 17:15
Modified
2024-11-21 03:52
Severity ?
Summary
A shell escape vulnerability in /webconsole/APIController in the API Configuration component of Sophos XG firewall 17.0.8 MR-8 allows remote attackers to execute arbitrary OS commands via shell metachracters in the "X-Forwarded-for" HTTP header.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:sophos:sfos:*:*:*:*:*:*:*:*", "matchCriteriaId": "F04F34AF-CF53-4A6C-B164-523319E17469", "versionEndIncluding": "16.0", "vulnerable": true }, { "criteria": "cpe:2.3:o:sophos:sfos:16.5:*:*:*:*:*:*:*", "matchCriteriaId": "BA0ED5FE-1DB6-4328-951D-B98F820C195E", "vulnerable": true }, { "criteria": "cpe:2.3:o:sophos:sfos:17.0:*:*:*:*:*:*:*", "matchCriteriaId": "BC4B4B56-5DF6-400D-BC59-ECAE47332E54", "vulnerable": true }, { "criteria": "cpe:2.3:o:sophos:sfos:17.0.8:mr8:*:*:*:*:*:*", "matchCriteriaId": "2A1ED172-73FE-4EEB-B3EE-7053AF6113BE", "vulnerable": true }, { "criteria": "cpe:2.3:o:sophos:sfos:17.1:*:*:*:*:*:*:*", "matchCriteriaId": "8F159D9E-F268-4648-8894-5A9426F7C6AF", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:sophos:xg_firewall:-:*:*:*:*:*:*:*", "matchCriteriaId": "9628D079-44BD-479E-BE63-9BEF824B4E4B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "A shell escape vulnerability in /webconsole/APIController in the API Configuration component of Sophos XG firewall 17.0.8 MR-8 allows remote attackers to execute arbitrary OS commands via shell metachracters in the \"X-Forwarded-for\" HTTP header." }, { "lang": "es", "value": "Una vulnerabilidad de escape de shell en /webconsole/APIController en el componente Configuration API Sophos XG firewall versi\u00f3n 17.0.8 MR-8, permite a los atacantes remotos ejecutar comandos arbitrarios del sistema operativo por medio de meta caracteres shell en el encabezado HTTP \"X-Forwarded-for\"." } ], "id": "CVE-2018-16118", "lastModified": "2024-11-21T03:52:07.157", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 9.3, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "exploitabilityScore": 2.2, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2019-06-20T17:15:10.063", "references": [ { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "https://community.sophos.com/kb/en-us/132637" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/klsecservices/Advisories/blob/master/KL-SOPHOS-2018-003.md" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "https://www.sophos.com/en-us/legal/sophos-responsible-disclosure-policy.aspx" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://community.sophos.com/kb/en-us/132637" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/klsecservices/Advisories/blob/master/KL-SOPHOS-2018-003.md" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.sophos.com/en-us/legal/sophos-responsible-disclosure-policy.aspx" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-78" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2020-06-18 16:15
Modified
2024-11-21 04:58
Severity ?
Summary
A heap-based buffer overflow in the awarrensmtp component of Sophos XG Firewall v17.5 MR11 and older potentially allows an attacker to run arbitrary code remotely.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:sophos:sfos:*:*:*:*:*:*:*:*", "matchCriteriaId": "6673468A-F625-4C45-93CC-8ED6EA164890", "versionEndExcluding": "17.5", "vulnerable": true }, { "criteria": "cpe:2.3:o:sophos:sfos:17.5:-:*:*:*:*:*:*", "matchCriteriaId": "6C221A68-8102-4DB0-AF89-E762D9A8F286", "vulnerable": true }, { "criteria": "cpe:2.3:o:sophos:sfos:17.5:maintenance_release1:*:*:*:*:*:*", "matchCriteriaId": "028DE0B8-14D6-4DD0-9CCE-6E2B83CCAE57", "vulnerable": true }, { "criteria": "cpe:2.3:o:sophos:sfos:17.5:maintenance_release10:*:*:*:*:*:*", "matchCriteriaId": "4B4E922F-5832-4BF3-94FF-55EA0045982D", "vulnerable": true }, { "criteria": "cpe:2.3:o:sophos:sfos:17.5:maintenance_release11:*:*:*:*:*:*", "matchCriteriaId": "7B30EC30-A915-4FC9-82BB-975429383397", "vulnerable": true }, { "criteria": "cpe:2.3:o:sophos:sfos:17.5:maintenance_release2:*:*:*:*:*:*", "matchCriteriaId": "E6C448EC-76C2-4574-A0BE-47A5FFC84F76", "vulnerable": true }, { "criteria": "cpe:2.3:o:sophos:sfos:17.5:maintenance_release3:*:*:*:*:*:*", "matchCriteriaId": "B812DFF6-0A51-4F9B-BB8D-DC80DE06C1E3", "vulnerable": true }, { "criteria": "cpe:2.3:o:sophos:sfos:17.5:maintenance_release4:*:*:*:*:*:*", "matchCriteriaId": "E2F2B6C9-C914-44E6-990C-8542A579F26E", "vulnerable": true }, { "criteria": "cpe:2.3:o:sophos:sfos:17.5:maintenance_release5:*:*:*:*:*:*", "matchCriteriaId": "DECF0D8C-305C-4E44-8BDE-835A93F51565", "vulnerable": true }, { "criteria": "cpe:2.3:o:sophos:sfos:17.5:maintenance_release6:*:*:*:*:*:*", "matchCriteriaId": "EC2CA7EE-47D4-4A86-A9A0-27046D9FC4D3", "vulnerable": true }, { "criteria": "cpe:2.3:o:sophos:sfos:17.5:maintenance_release7:*:*:*:*:*:*", "matchCriteriaId": "E6AFFFEF-7907-44C8-972B-41B43644F9DC", "vulnerable": true }, { "criteria": "cpe:2.3:o:sophos:sfos:17.5:maintenance_release8:*:*:*:*:*:*", "matchCriteriaId": "0B7AC9F6-50C6-4C50-89AF-0B49FD50ECE1", "vulnerable": true }, { "criteria": "cpe:2.3:o:sophos:sfos:17.5:maintenance_release9:*:*:*:*:*:*", "matchCriteriaId": "A1F9A128-2DF0-4B5B-BAE7-88C8AA983C19", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:sophos:xg_firewall:-:*:*:*:*:*:*:*", "matchCriteriaId": "9628D079-44BD-479E-BE63-9BEF824B4E4B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "A heap-based buffer overflow in the awarrensmtp component of Sophos XG Firewall v17.5 MR11 and older potentially allows an attacker to run arbitrary code remotely." }, { "lang": "es", "value": "Un desbordamiento de b\u00fafer en la regi\u00f3n heap de la memoria en el componente awarrensmtp de Sophos XG Firewall versiones v17.5 MR11 y anteriores, permite potencialmente a un atacante ejecutar c\u00f3digo arbitrario remotamente" } ], "id": "CVE-2020-11503", "lastModified": "2024-11-21T04:58:01.843", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2020-06-18T16:15:13.043", "references": [ { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "https://community.sophos.com/b/security-blog/posts/advisory-potential-rce-through-heap-overflow-in-awarrensmtp-cve-2020-11503" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://community.sophos.com/b/security-blog/posts/advisory-potential-rce-through-heap-overflow-in-awarrensmtp-cve-2020-11503" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-787" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2022-03-25 12:15
Modified
2024-11-21 06:39
Severity ?
9.8 (Critical) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
9.8 (Critical) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
9.8 (Critical) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Summary
An authentication bypass vulnerability in the User Portal and Webadmin allows a remote attacker to execute code in Sophos Firewall version v18.5 MR3 and older.
References
▼ | URL | Tags | |
---|---|---|---|
security-alert@sophos.com | http://packetstormsecurity.com/files/168046/Sophos-XG115w-Firewall-17.0.10-MR-10-Authentication-Bypass.html | Exploit, Third Party Advisory, VDB Entry | |
security-alert@sophos.com | https://www.exploit-db.com/exploits/51006 | Exploit, Third Party Advisory, VDB Entry | |
security-alert@sophos.com | https://www.sophos.com/en-us/security-advisories/sophos-sa-20220325-sfos-rce | Mitigation, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://packetstormsecurity.com/files/168046/Sophos-XG115w-Firewall-17.0.10-MR-10-Authentication-Bypass.html | Exploit, Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.exploit-db.com/exploits/51006 | Exploit, Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.sophos.com/en-us/security-advisories/sophos-sa-20220325-sfos-rce | Mitigation, Vendor Advisory |
{ "cisaActionDue": "2022-04-21", "cisaExploitAdd": "2022-03-31", "cisaRequiredAction": "Apply updates per vendor instructions.", "cisaVulnerabilityName": "Sophos Firewall Authentication Bypass Vulnerability", "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:sophos:sfos:*:*:*:*:*:*:*:*", "matchCriteriaId": "607A3F0A-C405-4A38-8766-4C79C62E9671", "versionEndIncluding": "18.5.3", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "An authentication bypass vulnerability in the User Portal and Webadmin allows a remote attacker to execute code in Sophos Firewall version v18.5 MR3 and older." }, { "lang": "es", "value": "Una vulnerabilidad de omisi\u00f3n de autenticaci\u00f3n en el Portal de Usuarios y Webadmin permite a un atacante remoto ejecutar c\u00f3digo en Sophos Firewall versiones v18.5 MR3 y anteriores" } ], "id": "CVE-2022-1040", "lastModified": "2024-11-21T06:39:54.780", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "security-alert@sophos.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2022-03-25T12:15:07.750", "references": [ { "source": "security-alert@sophos.com", "tags": [ "Exploit", "Third Party Advisory", "VDB Entry" ], "url": "http://packetstormsecurity.com/files/168046/Sophos-XG115w-Firewall-17.0.10-MR-10-Authentication-Bypass.html" }, { "source": "security-alert@sophos.com", "tags": [ "Exploit", "Third Party Advisory", "VDB Entry" ], "url": "https://www.exploit-db.com/exploits/51006" }, { "source": "security-alert@sophos.com", "tags": [ "Mitigation", "Vendor Advisory" ], "url": "https://www.sophos.com/en-us/security-advisories/sophos-sa-20220325-sfos-rce" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory", "VDB Entry" ], "url": "http://packetstormsecurity.com/files/168046/Sophos-XG115w-Firewall-17.0.10-MR-10-Authentication-Bypass.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory", "VDB Entry" ], "url": "https://www.exploit-db.com/exploits/51006" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mitigation", "Vendor Advisory" ], "url": "https://www.sophos.com/en-us/security-advisories/sophos-sa-20220325-sfos-rce" } ], "sourceIdentifier": "security-alert@sophos.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-noinfo" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2022-03-29 01:15
Modified
2024-11-21 06:38
Severity ?
5.3 (Medium) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
5.3 (Medium) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
5.3 (Medium) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
Summary
An information disclosure vulnerability in Webadmin allows an unauthenticated remote attacker to read the device serial number in Sophos Firewall version v18.5 MR2 and older.
References
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:sophos:sfos:*:*:*:*:*:*:*:*", "matchCriteriaId": "B5009B60-0E87-4110-8AE9-B0B7B808DC86", "versionEndIncluding": "18.5.2", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "An information disclosure vulnerability in Webadmin allows an unauthenticated remote attacker to read the device serial number in Sophos Firewall version v18.5 MR2 and older." }, { "lang": "es", "value": "Una vulnerabilidad de divulgaci\u00f3n de informaci\u00f3n en Webadmin permite a un atacante remoto no autenticado leer el n\u00famero de serie del dispositivo en Sophos Firewall versiones v18.5 MR2 y anteriores" } ], "id": "CVE-2022-0331", "lastModified": "2024-11-21T06:38:23.647", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 1.4, "source": "security-alert@sophos.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 1.4, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2022-03-29T01:15:07.097", "references": [ { "source": "security-alert@sophos.com", "tags": [ "Vendor Advisory" ], "url": "https://www.sophos.com/en-us/security-advisories/sophos-sa-20220328-sfos-18-5-3" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.sophos.com/en-us/security-advisories/sophos-sa-20220328-sfos-18-5-3" } ], "sourceIdentifier": "security-alert@sophos.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-noinfo" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2018-01-12 17:29
Modified
2024-11-21 03:19
Severity ?
Summary
An NC-25986 issue was discovered in the Logging subsystem of Sophos XG Firewall with SFOS before 17.0.3 MR3. An unauthenticated user can trigger a persistent XSS vulnerability found in the WAF log page (Control Center -> Log Viewer -> in the filter option "Web Server Protection") in the webadmin interface, and execute any action available to the webadmin of the firewall (e.g., creating a new user, enabling SSH, or adding an SSH authorized key). The WAF log page will execute the "User-Agent" parameter in the HTTP POST request.
References
▼ | URL | Tags | |
---|---|---|---|
cve@mitre.org | http://seclists.org/fulldisclosure/2018/Jan/24 | Mailing List, Third Party Advisory | |
cve@mitre.org | https://blogs.securiteam.com/index.php/archives/3612 | Exploit, Third Party Advisory | |
cve@mitre.org | https://community.sophos.com/kb/en-us/128024 | Vendor Advisory | |
cve@mitre.org | https://community.sophos.com/products/xg-firewall/b/xg-blog/posts/sfos-17-0-3-mr3-released | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://seclists.org/fulldisclosure/2018/Jan/24 | Mailing List, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://blogs.securiteam.com/index.php/archives/3612 | Exploit, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://community.sophos.com/kb/en-us/128024 | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://community.sophos.com/products/xg-firewall/b/xg-blog/posts/sfos-17-0-3-mr3-released | Vendor Advisory |
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:sophos:sfos:*:*:*:*:*:*:*:*", "matchCriteriaId": "7EF76A45-D3EB-4EF4-BA42-1B5F4232DAB9", "versionEndIncluding": "17.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:sophos:xg_firewall:-:*:*:*:*:*:*:*", "matchCriteriaId": "9628D079-44BD-479E-BE63-9BEF824B4E4B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:sophos:sfos:17.0:mr1:*:*:*:*:*:*", "matchCriteriaId": "7FA675D4-9074-48F2-B417-CC3B25F3F7EE", "vulnerable": true }, { "criteria": "cpe:2.3:o:sophos:sfos:17.0:mr2:*:*:*:*:*:*", "matchCriteriaId": "92CF1684-2AFD-4887-8904-8A628E5D8800", "vulnerable": true }, { "criteria": "cpe:2.3:o:sophos:sfos:17.0:mr3:*:*:*:*:*:*", "matchCriteriaId": "CC00A5F7-E60E-43B7-BBBE-DA333763B09B", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:sophos:xg_firewall:-:*:*:*:*:*:*:*", "matchCriteriaId": "9628D079-44BD-479E-BE63-9BEF824B4E4B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "An NC-25986 issue was discovered in the Logging subsystem of Sophos XG Firewall with SFOS before 17.0.3 MR3. An unauthenticated user can trigger a persistent XSS vulnerability found in the WAF log page (Control Center -\u003e Log Viewer -\u003e in the filter option \"Web Server Protection\") in the webadmin interface, and execute any action available to the webadmin of the firewall (e.g., creating a new user, enabling SSH, or adding an SSH authorized key). The WAF log page will execute the \"User-Agent\" parameter in the HTTP POST request." }, { "lang": "es", "value": "Se ha descubierto un problema NC-25986 en el subsistema de informes de Sophos XG Firewall with SFOS en versiones anteriores a la 17.0.3 MR3. Un usuario sin autenticar puede desencadenar una vulnerabilidad de Cross-Site Scripting (XSS) persistente en la p\u00e1gina de informes WAF (Control Center -\u003e Log Viewer -\u003e en el filtro opci\u00f3n \"Web Server Protection\") en la interfaz webadmin y ejecutar cualquier acci\u00f3n disponible para el webadmin del firewall (por ejemplo, crear un nuevo usuario, habilitar SSH o a\u00f1adir la clave SSH autorizada). La p\u00e1gina de informes WAF ejecutar\u00e1 el par\u00e1metro \"User-Agent\" en la petici\u00f3n HTTP POST." } ], "id": "CVE-2017-18014", "lastModified": "2024-11-21T03:19:09.930", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.0" }, "exploitabilityScore": 2.8, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2018-01-12T17:29:01.070", "references": [ { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://seclists.org/fulldisclosure/2018/Jan/24" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://blogs.securiteam.com/index.php/archives/3612" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "https://community.sophos.com/kb/en-us/128024" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "https://community.sophos.com/products/xg-firewall/b/xg-blog/posts/sfos-17-0-3-mr3-released" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://seclists.org/fulldisclosure/2018/Jan/24" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://blogs.securiteam.com/index.php/archives/3612" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://community.sophos.com/kb/en-us/128024" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://community.sophos.com/products/xg-firewall/b/xg-blog/posts/sfos-17-0-3-mr3-released" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-79" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2020-04-27 04:15
Modified
2025-02-04 20:15
Severity ?
Summary
A SQL injection issue was found in SFOS 17.0, 17.1, 17.5, and 18.0 before 2020-04-25 on Sophos XG Firewall devices, as exploited in the wild in April 2020. This affected devices configured with either the administration (HTTPS) service or the User Portal exposed on the WAN zone. A successful attack may have caused remote code execution that exfiltrated usernames and hashed passwords for the local device admin(s), portal admins, and user accounts used for remote access (but not external Active Directory or LDAP passwords)
References
▼ | URL | Tags | |
---|---|---|---|
cve@mitre.org | https://community.sophos.com/kb/en-us/135412 | Vendor Advisory | |
cve@mitre.org | https://cwe.mitre.org/data/definitions/89.html | Third Party Advisory | |
cve@mitre.org | https://news.sophos.com/en-us/2020/04/26/asnarok/ | Exploit, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://community.sophos.com/kb/en-us/135412 | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://cwe.mitre.org/data/definitions/89.html | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://news.sophos.com/en-us/2020/04/26/asnarok/ | Exploit, Vendor Advisory |
Impacted products
{ "cisaActionDue": "2022-05-03", "cisaExploitAdd": "2021-11-03", "cisaRequiredAction": "Apply updates per vendor instructions.", "cisaVulnerabilityName": "Sophos SFOS SQL Injection Vulnerability", "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:sophos:sfos:17.0:*:*:*:*:*:*:*", "matchCriteriaId": "BC4B4B56-5DF6-400D-BC59-ECAE47332E54", "vulnerable": true }, { "criteria": "cpe:2.3:o:sophos:sfos:17.1:*:*:*:*:*:*:*", "matchCriteriaId": "8F159D9E-F268-4648-8894-5A9426F7C6AF", "vulnerable": true }, { "criteria": "cpe:2.3:o:sophos:sfos:17.5:*:*:*:*:*:*:*", "matchCriteriaId": "788AC43C-23A8-4E86-A7F1-8133808D54F8", "vulnerable": true }, { "criteria": "cpe:2.3:o:sophos:sfos:18.0:*:*:*:*:*:*:*", "matchCriteriaId": "42065AE5-13B2-429E-9610-F14269A44D4A", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:sophos:xg_firewall:-:*:*:*:*:*:*:*", "matchCriteriaId": "9628D079-44BD-479E-BE63-9BEF824B4E4B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "A SQL injection issue was found in SFOS 17.0, 17.1, 17.5, and 18.0 before 2020-04-25 on Sophos XG Firewall devices, as exploited in the wild in April 2020. This affected devices configured with either the administration (HTTPS) service or the User Portal exposed on the WAN zone. A successful attack may have caused remote code execution that exfiltrated usernames and hashed passwords for the local device admin(s), portal admins, and user accounts used for remote access (but not external Active Directory or LDAP passwords)" }, { "lang": "es", "value": "Se descubri\u00f3\u00b4 un problema de inyecci\u00f3n SQL en SFOS versiones 17.0, 17.1, 17.5 y versiones 18.0 antes del 25-04-2020, en los dispositivos Firewall Sophos XG, tal como se explot\u00f3 \"in the wild\" en abril de 2020. Esto afect\u00f3 a los dispositivos configurados con el servicio de administraci\u00f3n (HTTPS) o el Portal de Usuario expuesto en la zona WAN. Un ataque con \u00e9xito puede haber filtrado nombres de usuario y contrase\u00f1as del hash a los administradores de los dispositivos locales, los administradores del portal y las cuentas de usuario usadas para el acceso remoto (pero no las contrase\u00f1as externas de Active Directory o LDAP)." } ], "id": "CVE-2020-12271", "lastModified": "2025-02-04T20:15:35.810", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 10.0, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H", "version": "3.0" }, "exploitabilityScore": 3.9, "impactScore": 6.0, "source": "cve@mitre.org", "type": "Secondary" } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2020-04-27T04:15:10.553", "references": [ { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "https://community.sophos.com/kb/en-us/135412" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://cwe.mitre.org/data/definitions/89.html" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Vendor Advisory" ], "url": "https://news.sophos.com/en-us/2020/04/26/asnarok/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://community.sophos.com/kb/en-us/135412" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://cwe.mitre.org/data/definitions/89.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Vendor Advisory" ], "url": "https://news.sophos.com/en-us/2020/04/26/asnarok/" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-89" } ], "source": "nvd@nist.gov", "type": "Primary" }, { "description": [ { "lang": "en", "value": "CWE-89" } ], "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary" } ] }
Vulnerability from fkie_nvd
Published
2019-06-20 17:15
Modified
2024-11-21 03:52
Severity ?
Summary
SQL injection vulnerability in AccountStatus.jsp in Admin Portal of Sophos XG firewall 17.0.8 MR-8 allow remote authenticated attackers to execute arbitrary SQL commands via the "username" GET parameter.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
sophos | sfos | 17.0.8 | |
sophos | xg_firewall | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:sophos:sfos:17.0.8:mr8:*:*:*:*:*:*", "matchCriteriaId": "2A1ED172-73FE-4EEB-B3EE-7053AF6113BE", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:sophos:xg_firewall:-:*:*:*:*:*:*:*", "matchCriteriaId": "9628D079-44BD-479E-BE63-9BEF824B4E4B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "SQL injection vulnerability in AccountStatus.jsp in Admin Portal of Sophos XG firewall 17.0.8 MR-8 allow remote authenticated attackers to execute arbitrary SQL commands via the \"username\" GET parameter." }, { "lang": "es", "value": "Vulnerabilidad de inyecci\u00f3n de SQL en AccountStatus.jsp en el Portal de administraci\u00f3n del firewall Sophos XG 17.0.8 MR-8 permite a atacantes remotos autenticados ejecutar comandos SQL arbitrarios a trav\u00e9s del par\u00e1metro GET del \"username\"." } ], "id": "CVE-2018-16116", "lastModified": "2024-11-21T03:52:06.813", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 6.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "exploitabilityScore": 2.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2019-06-20T17:15:09.957", "references": [ { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "https://community.sophos.com/kb/en-us/132637" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://github.com/klsecservices/Advisories/blob/master/KL-SOPHOS-2018-001.md" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "https://www.sophos.com/en-us/legal/sophos-responsible-disclosure-policy.aspx" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://community.sophos.com/kb/en-us/132637" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://github.com/klsecservices/Advisories/blob/master/KL-SOPHOS-2018-001.md" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.sophos.com/en-us/legal/sophos-responsible-disclosure-policy.aspx" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-89" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }