{"api_version":"1","generated_at":"2026-04-22T21:02:43+00:00","cve":"CVE-2023-34133","urls":{"html":"https://cve.report/CVE-2023-34133","api":"https://cve.report/api/cve/CVE-2023-34133.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2023-34133","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2023-34133"},"summary":{"title":"CVE-2023-34133","description":"Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in SonicWall GMS and Analytics allows an unauthenticated attacker to extract sensitive information from the application database. This issue affects GMS: 9.3.2-SP1 and earlier versions; Analytics: 2.5.0.4-R7 and earlier versions.","state":"PUBLIC","assigner":"PSIRT@sonicwall.com","published_at":"2023-07-13 03:15:00","updated_at":"2023-09-08 23:15:00"},"problem_types":["CWE-89"],"metrics":[],"references":[{"url":"http://packetstormsecurity.com/files/174571/Sonicwall-GMS-9.9.9320-Remote-Code-Execution.html","name":"http://packetstormsecurity.com/files/174571/Sonicwall-GMS-9.9.9320-Remote-Code-Execution.html","refsource":"MISC","tags":[],"title":"Sonicwall GMS 9.9.9320 Remote Code Execution ≈ Packet Storm","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2023-0010","name":"https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2023-0010","refsource":"MISC","tags":[],"title":"Security Advisory","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://www.sonicwall.com/support/notices/230710150218060","name":"https://www.sonicwall.com/support/notices/230710150218060","refsource":"MISC","tags":[],"title":"","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://www.cve.org/CVERecord?id=CVE-2023-34133","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2023-34133","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[{"cve_year":"2023","cve_id":"34133","vulnerable":"1","versionEndIncluding":"2.5.0.4-r7","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"sonicwall","cpe5":"analytics","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2023","cve_id":"34133","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"sonicwall","cpe5":"global_management_system","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2023","cve_id":"34133","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"sonicwall","cpe5":"global_management_system","cpe6":"9.3.2","cpe7":"-","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2023","cve_id":"34133","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"sonicwall","cpe5":"global_management_system","cpe6":"9.3.2","cpe7":"sp1","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"}],"vendor_comments":[],"enrichments":{"kev":null,"epss":null,"legacy_qids":[]},"source_records":{"cve_program":{"data_version":"4.0","data_type":"CVE","data_format":"MITRE","CVE_data_meta":{"ID":"CVE-2023-34133","ASSIGNER":"PSIRT@sonicwall.com","STATE":"PUBLIC"},"description":{"description_data":[{"lang":"eng","value":"Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in SonicWall GMS and Analytics allows an unauthenticated attacker to extract sensitive information from the application database. This issue affects GMS: 9.3.2-SP1 and earlier versions; Analytics: 2.5.0.4-R7 and earlier versions."}]},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')","cweId":"CWE-89"}]}]},"affects":{"vendor":{"vendor_data":[{"vendor_name":"SonicWall","product":{"product_data":[{"product_name":"GMS","version":{"version_data":[{"version_affected":"=","version_value":"9.3.2-SP1 and earlier versions"}]}},{"product_name":"Analytics","version":{"version_data":[{"version_affected":"=","version_value":"2.5.0.4-R7 and earlier versions"}]}}]}}]}},"references":{"reference_data":[{"url":"https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2023-0010","refsource":"MISC","name":"https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2023-0010"},{"url":"https://www.sonicwall.com/support/notices/230710150218060","refsource":"MISC","name":"https://www.sonicwall.com/support/notices/230710150218060"},{"url":"http://packetstormsecurity.com/files/174571/Sonicwall-GMS-9.9.9320-Remote-Code-Execution.html","refsource":"MISC","name":"http://packetstormsecurity.com/files/174571/Sonicwall-GMS-9.9.9320-Remote-Code-Execution.html"}]},"generator":{"engine":"Vulnogram 0.1.0-dev"},"source":{"discovery":"UNKNOWN"}},"nvd":{"publishedDate":"2023-07-13 03:15:00","lastModifiedDate":"2023-09-08 23:15:00","problem_types":["CWE-89"],"metrics":{"baseMetricV3":{"cvssV3":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"NONE","availabilityImpact":"NONE","baseScore":7.5,"baseSeverity":"HIGH"},"exploitabilityScore":3.9,"impactScore":3.6}},"configurations":{"CVE_data_version":"4.0","nodes":[{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:sonicwall:global_management_system:*:*:*:*:*:*:*:*","versionEndExcluding":"9.3.2","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:sonicwall:analytics:*:*:*:*:*:*:*:*","versionEndIncluding":"2.5.0.4-r7","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:sonicwall:global_management_system:9.3.2:sp1:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:sonicwall:global_management_system:9.3.2:-:*:*:*:*:*:*","cpe_name":[]}]}]}},"legacy_mitre":{"record":null,"notes":[]}}}