Vulnerability Description
A stored cross-site scripting (XSS) vulnerability exists in the SonicOS SSLVPN web interface. A remote unauthenticated attacker is able to store and potentially execute arbitrary JavaScript code in the firewall SSLVPN portal. This vulnerability affected SonicOS Gen 5 version 5.9.1.7, 5.9.1.13, Gen 6 version 6.5.4.7, 6.5.1.12, 6.0.5.3, SonicOSv 6.5.4.v and Gen 7 version SonicOS 7.0.0.0.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Sonicwall | Sonicos | <= 5.9.1.13 |
| Sonicwall | Sonicosv | <= 6.5.4.4 |
Related Weaknesses (CWE)
References
- https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2020-0017Vendor Advisory
- https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2020-0017Vendor Advisory
FAQ
What is CVE-2020-5142?
CVE-2020-5142 is a vulnerability with a CVSS score of 6.1 (MEDIUM). A stored cross-site scripting (XSS) vulnerability exists in the SonicOS SSLVPN web interface. A remote unauthenticated attacker is able to store and potentially execute arbitrary JavaScript code in th...
How severe is CVE-2020-5142?
CVE-2020-5142 has been rated MEDIUM with a CVSS base score of 6.1/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2020-5142?
Check the references section above for vendor advisories and patch information. Affected products include: Sonicwall Sonicos, Sonicwall Sonicosv.