VAR-201504-0442

Vulnerability from variot - Updated: 2025-04-13 23:34

Multiple cross-site scripting (XSS) vulnerabilities in macIpSpoofView.html in Dell SonicWall SonicOS 7.5.0.12 and 6.x allow remote attackers to inject arbitrary web script or HTML via the (1) searchSpoof or (2) searchSpoofIpDet parameter. This may allow the attacker to steal cookie-based authentication credentials and launch other attacks. SonicOS 7.5.0.12 and 6.0 are vulnerable. Dell SonicWall SonicOS is a set of operating system specially designed for SonicWall firewall equipment of Dell (Dell). A cross-site scripting vulnerability exists in the macIpSpoofView.html file of Dell SonicWall SonicOS versions 7.5.0.12 and 6.x

Show details on source website

{
  "@context": {
    "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
    "affected_products": {
      "@id": "https://www.variotdbs.pl/ref/affected_products"
    },
    "configurations": {
      "@id": "https://www.variotdbs.pl/ref/configurations"
    },
    "credits": {
      "@id": "https://www.variotdbs.pl/ref/credits"
    },
    "cvss": {
      "@id": "https://www.variotdbs.pl/ref/cvss/"
    },
    "description": {
      "@id": "https://www.variotdbs.pl/ref/description/"
    },
    "exploit_availability": {
      "@id": "https://www.variotdbs.pl/ref/exploit_availability/"
    },
    "external_ids": {
      "@id": "https://www.variotdbs.pl/ref/external_ids/"
    },
    "iot": {
      "@id": "https://www.variotdbs.pl/ref/iot/"
    },
    "iot_taxonomy": {
      "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
    },
    "patch": {
      "@id": "https://www.variotdbs.pl/ref/patch/"
    },
    "problemtype_data": {
      "@id": "https://www.variotdbs.pl/ref/problemtype_data/"
    },
    "references": {
      "@id": "https://www.variotdbs.pl/ref/references/"
    },
    "sources": {
      "@id": "https://www.variotdbs.pl/ref/sources/"
    },
    "sources_release_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_release_date/"
    },
    "sources_update_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_update_date/"
    },
    "threat_type": {
      "@id": "https://www.variotdbs.pl/ref/threat_type/"
    },
    "title": {
      "@id": "https://www.variotdbs.pl/ref/title/"
    },
    "type": {
      "@id": "https://www.variotdbs.pl/ref/type/"
    }
  },
  "@id": "https://www.variotdbs.pl/vuln/VAR-201504-0442",
  "affected_products": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "model": "sonicos",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "sonicwall",
        "version": "7.5.0.12"
      },
      {
        "model": "sonicwall sonicos",
        "scope": "eq",
        "trust": 1.1,
        "vendor": "dell",
        "version": "7.5.0.12"
      },
      {
        "model": "sonicos",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "sonicwall",
        "version": "6.2.2.0"
      },
      {
        "model": "sonicos",
        "scope": "gte",
        "trust": 1.0,
        "vendor": "sonicwall",
        "version": "6.0.0.0"
      },
      {
        "model": "sonicwall sonicos",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "dell",
        "version": "6.x"
      },
      {
        "model": "sonicos",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "sonicwall",
        "version": "6.2.2.0"
      },
      {
        "model": "sonicwall sonicos",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "dell",
        "version": "6.0"
      }
    ],
    "sources": [
      {
        "db": "BID",
        "id": "74406"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2015-002514"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201504-588"
      },
      {
        "db": "NVD",
        "id": "CVE-2015-3447"
      }
    ]
  },
  "configurations": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/configurations#",
      "children": {
        "@container": "@list"
      },
      "cpe_match": {
        "@container": "@list"
      },
      "data": {
        "@container": "@list"
      },
      "nodes": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "CVE_data_version": "4.0",
        "nodes": [
          {
            "cpe_match": [
              {
                "cpe22Uri": "cpe:/o:dell:sonicwall_sonicos",
                "vulnerable": true
              }
            ],
            "operator": "OR"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2015-002514"
      }
    ]
  },
  "credits": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/credits#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Vulnerability Laboratory",
    "sources": [
      {
        "db": "BID",
        "id": "74406"
      }
    ],
    "trust": 0.3
  },
  "cve": "CVE-2015-3447",
  "cvss": {
    "@context": {
      "cvssV2": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
      },
      "cvssV3": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
      },
      "severity": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/cvss/severity#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/severity"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "cvssV2": [
          {
            "accessComplexity": "MEDIUM",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "nvd@nist.gov",
            "availabilityImpact": "NONE",
            "baseScore": 4.3,
            "confidentialityImpact": "NONE",
            "exploitabilityScore": 8.6,
            "id": "CVE-2015-3447",
            "impactScore": 2.9,
            "integrityImpact": "PARTIAL",
            "severity": "MEDIUM",
            "trust": 1.8,
            "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
            "version": "2.0"
          },
          {
            "accessComplexity": "MEDIUM",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "VULHUB",
            "availabilityImpact": "NONE",
            "baseScore": 4.3,
            "confidentialityImpact": "NONE",
            "exploitabilityScore": 8.6,
            "id": "VHN-81408",
            "impactScore": 2.9,
            "integrityImpact": "PARTIAL",
            "severity": "MEDIUM",
            "trust": 0.1,
            "vectorString": "AV:N/AC:M/AU:N/C:N/I:P/A:N",
            "version": "2.0"
          }
        ],
        "cvssV3": [],
        "severity": [
          {
            "author": "nvd@nist.gov",
            "id": "CVE-2015-3447",
            "trust": 1.0,
            "value": "MEDIUM"
          },
          {
            "author": "NVD",
            "id": "CVE-2015-3447",
            "trust": 0.8,
            "value": "Medium"
          },
          {
            "author": "CNNVD",
            "id": "CNNVD-201504-588",
            "trust": 0.6,
            "value": "MEDIUM"
          },
          {
            "author": "VULHUB",
            "id": "VHN-81408",
            "trust": 0.1,
            "value": "MEDIUM"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-81408"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2015-002514"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201504-588"
      },
      {
        "db": "NVD",
        "id": "CVE-2015-3447"
      }
    ]
  },
  "description": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/description#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Multiple cross-site scripting (XSS) vulnerabilities in macIpSpoofView.html in Dell SonicWall SonicOS 7.5.0.12 and 6.x allow remote attackers to inject arbitrary web script or HTML via the (1) searchSpoof or (2) searchSpoofIpDet parameter. This may allow the attacker to steal cookie-based authentication credentials and launch other attacks. \nSonicOS 7.5.0.12 and 6.0 are vulnerable. Dell SonicWall SonicOS is a set of operating system specially designed for SonicWall firewall equipment of Dell (Dell). A cross-site scripting vulnerability exists in the macIpSpoofView.html file of Dell SonicWall SonicOS versions 7.5.0.12 and 6.x",
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2015-3447"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2015-002514"
      },
      {
        "db": "BID",
        "id": "74406"
      },
      {
        "db": "VULHUB",
        "id": "VHN-81408"
      }
    ],
    "trust": 1.98
  },
  "external_ids": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "db": "NVD",
        "id": "CVE-2015-3447",
        "trust": 2.8
      },
      {
        "db": "BID",
        "id": "74406",
        "trust": 1.4
      },
      {
        "db": "SECTRACK",
        "id": "1032204",
        "trust": 1.1
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2015-002514",
        "trust": 0.8
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201504-588",
        "trust": 0.7
      },
      {
        "db": "VULHUB",
        "id": "VHN-81408",
        "trust": 0.1
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-81408"
      },
      {
        "db": "BID",
        "id": "74406"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2015-002514"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201504-588"
      },
      {
        "db": "NVD",
        "id": "CVE-2015-3447"
      }
    ]
  },
  "id": "VAR-201504-0442",
  "iot": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": true,
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-81408"
      }
    ],
    "trust": 0.01
  },
  "last_update_date": "2025-04-13T23:34:04.964000Z",
  "patch": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/patch#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "title": "Top Page",
        "trust": 0.8,
        "url": "http://www.sonicwall.com/japan/"
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2015-002514"
      }
    ]
  },
  "problemtype_data": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "problemtype": "CWE-79",
        "trust": 1.9
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-81408"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2015-002514"
      },
      {
        "db": "NVD",
        "id": "CVE-2015-3447"
      }
    ]
  },
  "references": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/references#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "trust": 2.5,
        "url": "http://www.vulnerability-lab.com/get_content.php?id=1359"
      },
      {
        "trust": 1.7,
        "url": "http://seclists.org/fulldisclosure/2015/apr/97"
      },
      {
        "trust": 1.1,
        "url": "http://www.securityfocus.com/bid/74406"
      },
      {
        "trust": 1.1,
        "url": "http://www.securityfocus.com/archive/1/535393/100/0/threaded"
      },
      {
        "trust": 1.1,
        "url": "http://www.securitytracker.com/id/1032204"
      },
      {
        "trust": 0.9,
        "url": "http://www.securityfocus.com/archive/1/archive/1/535393/100/0/threaded"
      },
      {
        "trust": 0.8,
        "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2015-3447"
      },
      {
        "trust": 0.8,
        "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2015-3447"
      },
      {
        "trust": 0.3,
        "url": "http://o-www.sonicwall.com/us/en/products/network_security_platform.html"
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-81408"
      },
      {
        "db": "BID",
        "id": "74406"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2015-002514"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201504-588"
      },
      {
        "db": "NVD",
        "id": "CVE-2015-3447"
      }
    ]
  },
  "sources": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "db": "VULHUB",
        "id": "VHN-81408"
      },
      {
        "db": "BID",
        "id": "74406"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2015-002514"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201504-588"
      },
      {
        "db": "NVD",
        "id": "CVE-2015-3447"
      }
    ]
  },
  "sources_release_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2015-04-29T00:00:00",
        "db": "VULHUB",
        "id": "VHN-81408"
      },
      {
        "date": "2015-04-23T00:00:00",
        "db": "BID",
        "id": "74406"
      },
      {
        "date": "2015-05-01T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2015-002514"
      },
      {
        "date": "2015-04-30T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-201504-588"
      },
      {
        "date": "2015-04-29T20:59:04.623000",
        "db": "NVD",
        "id": "CVE-2015-3447"
      }
    ]
  },
  "sources_update_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2018-10-09T00:00:00",
        "db": "VULHUB",
        "id": "VHN-81408"
      },
      {
        "date": "2015-04-23T00:00:00",
        "db": "BID",
        "id": "74406"
      },
      {
        "date": "2015-05-01T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2015-002514"
      },
      {
        "date": "2015-04-30T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-201504-588"
      },
      {
        "date": "2025-04-12T10:46:40.837000",
        "db": "NVD",
        "id": "CVE-2015-3447"
      }
    ]
  },
  "threat_type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "remote",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-201504-588"
      }
    ],
    "trust": 0.6
  },
  "title": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/title#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Dell SonicWall SonicOS of  macIpSpoofView.html Vulnerable to cross-site scripting",
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2015-002514"
      }
    ],
    "trust": 0.8
  },
  "type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "XSS",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-201504-588"
      }
    ],
    "trust": 0.6
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…