Public exploit available
Public proof-of-concept or exploit code exists (ExploitDB / Metasploit / Nuclei).

CVE-2021-20031Open Redirect in Sonicos

CWE-601Open Redirect5 documents5 sources
Severity
6.1MEDIUMNVD
EPSS
36.2%
top 2.89%
CISA KEV
Not in KEV
Exploit
PoC available
Public exploit / PoC exists
Affected products
Timeline
PublishedOct 12
Latest updateMay 24

Description

A Host Header Redirection vulnerability in SonicOS potentially allows a remote attacker to redirect firewall management users to arbitrary web domains.

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:NExploitability: 2.8 | Impact: 2.7

Affected Packages2 packages

NVDsonicwall/sonicos7.0.1-r1262+6
CVEListV5sonicwall/sonicos8 versions+7

🔴Vulnerability Details

2
GHSA
GHSA-467c-cx8x-xprw: A Host Header Redirection vulnerability in SonicOS potentially allows a remote attacker to redirect firewall management users to arbitrary web domains2022-05-24
CVEList
CVE-2021-20031: A Host Header Redirection vulnerability in SonicOS potentially allows a remote attacker to redirect firewall management users to arbitrary web domains2021-10-12

💥Exploits & PoCs

2
Exploit-DB
Sonicwall SonicOS 7.0 - Host Header Injection2021-10-13
Nuclei
SonicWall SonicOS 7.0 - Open Redirect
CVE-2021-20031 — Open Redirect in Sonicwall Sonicos | cvebase