#VU52039 Arbitrary file upload in SonicWall On-premise Email Security (ES) and SonicWall Hosted Email Security (HES)


Published: 2021-04-12 | Updated: 2021-04-21

Vulnerability identifier: #VU52039

Vulnerability risk: High

CVSSv3.1: 6.9 [CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:H/RL:O/RC:C]

CVE-ID: CVE-2021-20022

CWE-ID: CWE-434

Exploitation vector: Network

Exploit availability: No

Vulnerable software:
SonicWall On-premise Email Security (ES)
Client/Desktop applications / Antivirus software/Personal firewalls
SonicWall Hosted Email Security (HES)
Client/Desktop applications / Antivirus software/Personal firewalls

Vendor:

Description

The vulnerability allows a remote user to compromise vulnerable system.

The vulnerability exists due to insufficient validation of file during file upload within the branding feature. A remote administrator can upload a malicious ZIP archive to the system to an arbitrary location using directory traversal sequences in the filenames inside the uploaded archive and compromise the affected system.

Note, the vulnerability is being actively exploited in the wild.

Mitigation
Install updates from vendor's website.

Vulnerable software versions


External links
http://psirt.global.sonicwall.com/vuln-detail/SNWLID-2021-0008
http://www.fireeye.com/blog/threat-research/2021/04/zero-day-exploits-in-sonicwall-email-security-lead-to-compromise.html


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote authenticated privileged user via the Internet.

Is there known malware, which exploits this vulnerability?

Yes. This vulnerability is being exploited in the wild.


Latest bulletins with this vulnerability