EX SSL-VPN: CSRF, MD5, Query Parameters & Session Identifier Exploit Vulnerabilities reported on Av
03/26/2020
5 People found this article helpful
195,390 Views
Description
EX SSL-VPN: CSRF, MD5, Query Parameters & Session Identifier Exploit Vulnerabilities reported on Aventail Appliance and Status
Resolution
Reported Vulnerabilities & Aventail Status:
1. Cross-Site Request Forgery
This reported vulnerability is based on the insufficient authentication methods used by any application.
Affected URLS:
https:///__extraweb__logoff
https:///workplace/access/exec/logoff
Details:
The reported URL's are part of our user Logoff process and do not represent a threat to user or company data.
2. Session Identifier Not Updated
The reported vulnerability is related to insecure Web Application programming and configuration. It is possible to steal or manipulate customer session and cookies to impersonate a legitimate user.
Affected URLs:
https:///__extraweb__authen
Details:
SonicWall believes this to be a false positive. The page /__extraweb__authen' does not accept any identifiers or cookies that could impersonate a legitimate user.
3. Query Parameter in SSL Request
The following URL's may contain sensitive information and it may be possible to steal such data that are send unencrypted.
Affected URLs:
https:///__extraweb__authen
https:///__extraweb__EPCmicrointerrogatordata
https:///__extraweb__realmform
https:///__extraweb__starttimer
https:///postauth/__EPCinterrogatornext
https:///postauth/__EPCinterrogatorpage
https:///postauthI/interrogator.js
https:///workplace/access/system/status
https:///workplace/access/system/userstate
Details:
The vulnerability is due to query parameters that were passed over SSL. SonicWall does not consider this to be a leak of sensitive information, and considers this a false positive.
4. MD5 signed SSL Certificates
The following URL's were detected to use certificates signed with MD5 algorithm. MD5 Signature Algorithm is obsolete and it can result in Phishing attacks.
Affected URLs:
https://:8443
https:///__extraweb__realmform
Details:
Workplace and AMC access by default maybe setup to use Self Signed Certificates during the initial setup. Before deploying it in production, customers are encouraged to use certificates that are signed by more secure algorithms like Sha1 or even SHA2.
For more details, please contact SonicWall Support.
Tracking ID: 138155
Related Articles
Categories
Was This Article Helpful?
YES
NO