Path Traversal vulnerability in SonicWall GMS and Analytics allows a remote authenticated attacker to read arbitrary files from the underlying file system via web service. This issue affects GMS: 9.3.2-SP1 and earlier versions; Analytics: 2.5.0.4-R7 and earlier versions.
The product uses external input to construct a pathname that should be within a restricted directory, but it does not properly neutralize absolute path sequences such as “/abs/path” that can resolve to a location that is outside of that directory.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Analytics | Sonicwall | * | 2.5.0.4-r7 (including) |
Global_management_system | Sonicwall | * | 9.3.2 (excluding) |
Global_management_system | Sonicwall | 9.3.2 (including) | 9.3.2 (including) |
Global_management_system | Sonicwall | 9.3.2-sp1 (including) | 9.3.2-sp1 (including) |