Barracuda Networks Spam Firewall Cross-Site Scripting Vulnerability

2008.05.24
Credit: Mark Crowther
Risk: Low
Local: No
Remote: Yes
CWE: CWE-79


CVSS Base Score: 4.3/10
Impact Subscore: 2.9/10
Exploitability Subscore: 8.6/10
Exploit range: Remote
Attack complexity: Medium
Authentication: No required
Confidentiality impact: None
Integrity impact: Partial
Availability impact: None

Barracuda Networks Spam Firewall Cross-Site Scripting Vulnerability CVE Number: CVE-2008-2333 Vulnerability Type / Importance: Cross-Site Scripting (Reflected) / Medium Problem Discovered 24 April 2008 Vendor Contacted 24 April 2008 Advisory Published 22 May 2008 Abstract The Barracuda Spam Firewall device web administration interface is vulnerable to a reflected cross-site scripting vulnerability which may allow theft of administrative credentials or downloading of malicious content. Description: The Barracuda device presents LDAP testing functionality via a script called 'ldap_test.cgi'. The script does not sufficiently validate user-supplied input within the 'email' parameter. As a result, client-supplied script code can be injected into the 'email' parameter that would execute in the browser within the security context of the Barracuda device. Vendor information: http://www.barracudanetworks.com/ns/support/tech_alert.php Proof of Concept: https://<vulnerable_host>/cgi-bin/ldap_test.cgi?host=127.0.0.1&port=1&tl s_mode=tls_mode&tls_require=&username=&password=&filter=&searchbase=&uni que_attr=&email_attr=&domain=*&email=%3Cscript%3Ealert(document.cookie)% 3C/script%3E Mitigation: Access to the web management application can be limited by IP address. Firmware release 3.5.11.025 has been released by the vendor to address this issue; however the patch has not been tested by IRM. Tested/Affected Versions: IRM confirmed the presence of this vulnerability in Barracuda Spam Firewall 600 Firmware 3.5.11.020. The vendor has confirmed the issue exists in all versions prior to 3.5.11.025. Credits Research and Advisory: Information Risk Management Plc. About IRM: Information Risk Management Plc (IRM) is a vendor independent information risk consultancy, founded in 1998. IRM has become a leader in client side risk assessment, technical level auditing and in the research and development of security vulnerabilities and tools. IRM is headquartered in London with Technical Centres in Europe and Asia as well as Regional Offices in the Far East and North America. Please visit our website at www.irmplc.com for further information. Disclaimer: All information in this advisory is provided on an 'as is' basis in the hope that it will be useful. Information Risk Management Plc is not responsible for any risks or occurrences caused by the application of this information.


Vote for this issue:
50%
50%


 

Thanks for you vote!


 

Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.


(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2024, cxsecurity.com

 

Back to Top