Path Traversal vulnerability in GMS and Analytics allows an authenticated attacker to read arbitrary files from the underlying filesystem with root privileges. This issue affects GMS: 9.3.2-SP1 and earlier versions; Analytics: 2.5.0.4-R7 and earlier versions.
References
Link | Resource |
---|---|
https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2023-0010 | Vendor Advisory |
https://www.sonicwall.com/support/notices/230710150218060 | Vendor Advisory |
https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2023-0010 | Vendor Advisory |
https://www.sonicwall.com/support/notices/230710150218060 | Vendor Advisory |
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 08:06
Type | Values Removed | Values Added |
---|---|---|
References | () https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2023-0010 - Vendor Advisory | |
References | () https://www.sonicwall.com/support/notices/230710150218060 - Vendor Advisory |
20 Jul 2023, 19:43
Type | Values Removed | Values Added |
---|---|---|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 6.5 |
First Time |
Sonicwall analytics
Sonicwall Sonicwall global Management System |
|
CWE | CWE-22 | |
References | (MISC) https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2023-0010 - Vendor Advisory | |
References | (MISC) https://www.sonicwall.com/support/notices/230710150218060 - Vendor Advisory | |
CPE | cpe:2.3:a:sonicwall:global_management_system:9.3.2:sp1:*:*:*:*:*:* cpe:2.3:a:sonicwall:global_management_system:9.3.2:-:*:*:*:*:*:* cpe:2.3:a:sonicwall:global_management_system:*:*:*:*:*:*:*:* cpe:2.3:a:sonicwall:analytics:*:*:*:*:*:*:*:* |
13 Jul 2023, 01:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2023-07-13 01:15
Updated : 2024-11-21 08:06
NVD link : CVE-2023-34125
Mitre link : CVE-2023-34125
CVE.ORG link : CVE-2023-34125
JSON object : View
Products Affected
sonicwall
- global_management_system
- analytics