module

Dell SonicWALL Scrutinizer 11.01 methodDetail SQL Injection

Disclosed
2014-07-24
Created
2018-05-30

Description

This module exploits a vulnerability found in Dell SonicWALL Scrutinizer. The methodDetail
parameter in exporters.php allows an attacker to write arbitrary files to the file system
with an SQL Injection attack, and gain remote code execution under the context of SYSTEM
for Windows, or as Apache for Linux.

Authentication is required to exploit this vulnerability, but this module uses
the default admin:admin credential.

Authors

bperry
sinn3r sinn3r@metasploit.com

Platform

Linux,Windows

Architectures

x86

Module Options

To display the available options, load the module within the Metasploit console and run the commands ‘show options’ or ‘show advanced’:


msf > use exploit/multi/http/sonicwall_scrutinizer_methoddetail_sqli
msf exploit(sonicwall_scrutinizer_methoddetail_sqli) > show targets
...targets...
msf exploit(sonicwall_scrutinizer_methoddetail_sqli) > set TARGET < target-id >
msf exploit(sonicwall_scrutinizer_methoddetail_sqli) > show options
...show and set options...
msf exploit(sonicwall_scrutinizer_methoddetail_sqli) > exploit

Title
NEW

Explore Exposure Command

Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.