.. / CVE-2021-20031

Exploit for SonicWall SonicOS 7.0 - Open Redirect (CVE-2021-20031)

Description:

SonicWall SonicOS 7.0 contains an open redirect vulnerability. The values of the Host headers are implicitly set as trusted. An attacker can spoof a particular host header, allowing the attacker to render arbitrary links, obtain sensitive information, modify data, execute unauthorized operations. and/or possibly redirect a user to a malicious site.

Nuclei Template

View the template here CVE-2021-20031.yaml

Validate with Nuclei

echo "$URL" | nuclei -t ~/nuclei-templates/http/cves/2021/CVE-2021-20031.yaml
Copy

References:

https://github.com/ARPSyndicate/cvemon
https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2021-0019
https://www.exploit-db.com/exploits/50414
http://packetstormsecurity.com/files/164502/Sonicwall-SonicOS-7.0-Host-Header-Injection.html
https://nvd.nist.gov/vuln/detail/CVE-2021-20031