RULE(RULE ID:712745)

Rule General Information
Release Date: 2018-11-05
Rule Name: EXPLOIT SonicWall Global Management System - XMLRPC set_time_zone Command Injection Vulnerability(CVE-2018-9866)
Severity:
CVE ID:
Rule Protection Details
Description: A vulnerability in lack of validation of user-supplied parameters pass to XML-RPC calls on SonicWall Global Management System (GMS) virtual appliance's, allow remote user to execute arbitrary code. This vulnerability affected GMS version 8.1 and earlier.
Impact: An attacker can execute arbitrary command via a successful exploit in the context of the vulnerable software.
Affected OS: Network Device, Solaris, FreeBSD, Windows, Mac OS, iOS, Other Unix, Linux, Others, Android
Reference: https://github.com/rapid7/metasploit-framework/pull/10305
https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2018-0007
https://twitter.com/ddouhine/status/1019251292202586112
Solutions
There is no information about possible countermeasures known. It may be suggested to replace the affected object with an alternative product.