SonicWALL – ‘SessId’ Cookie Brute Force / Admin Session Hijacking

  • 作者: Hugo Vazquez
    日期: 2011-10-04
  • 类别:
    平台:
  • 来源:https://www.exploit-db.com/exploits/36205/
  • source: https://www.securityfocus.com/bid/49930/info
    
    SonicWall NSA 4500 is prone to an HTML-injection vulnerability and a session-hijacking vulnerability.
    
    Exploiting these issues can allow an attacker to hijack a user's session and gain unauthorized access to the affected application, or run malicious HTML or JavaScript code, potentially allowing the attacker to steal cookie-based authentication credentials, and control how the site is rendered to the user; other attacks are also possible.
    
    GET /log.wri HTTP/1.0
    Host: 123.123.123.123
    Connection: close
    User-Agent: brute-forcing
    Cookie: SessId=111111111