Multiple cross-site scripting (XSS) vulnerabilities in BarracudaDrive before 6.7 allow remote attackers to inject arbitrary web script or HTML via the (1) sForumName or (2) sDescription parameter to Forum/manage/ForumManager.lsp; (3) sHint, (4) sWord, or (5) nId parameter to Forum/manage/hangman.lsp; (6) user parameter to rtl/protected/admin/wizard/setuser.lsp; (7) name or (8) email parameter to feedback.lsp; (9) lname or (10) url parameter to private/manage/PageManager.lsp; (11) cmd parameter to fs; (12) newname, (13) description, (14) firstname, (15) lastname, or (16) id parameter to rtl/protected/mail/manage/list.lsp; or (17) PATH_INFO to fs/.
References
Link | Resource |
---|---|
http://barracudadrive.com/readme.txt | Release Notes Vendor Advisory |
http://packetstormsecurity.com/files/125766 | Exploit Third Party Advisory VDB Entry |
http://secpod.org/advisories/SecPod_BarracudaDrive_Mult_XSS_Vuln.txt | Broken Link |
http://secpod.org/blog/?p=2158 | Broken Link |
http://secunia.com/advisories/57451 | Not Applicable Third Party Advisory |
http://www.securityfocus.com/bid/66269 | Third Party Advisory VDB Entry |
https://exchange.xforce.ibmcloud.com/vulnerabilities/91920 | VDB Entry Vendor Advisory |
Configurations
History
27 May 2021, 16:42
Type | Values Removed | Values Added |
---|---|---|
References | (MISC) http://secpod.org/advisories/SecPod_BarracudaDrive_Mult_XSS_Vuln.txt - Broken Link | |
References | (CONFIRM) http://barracudadrive.com/readme.txt - Release Notes, Vendor Advisory | |
References | (XF) https://exchange.xforce.ibmcloud.com/vulnerabilities/91920 - VDB Entry, Vendor Advisory | |
References | (SECUNIA) http://secunia.com/advisories/57451 - Not Applicable, Third Party Advisory | |
References | (MISC) http://packetstormsecurity.com/files/125766 - Exploit, Third Party Advisory, VDB Entry | |
References | (BID) http://www.securityfocus.com/bid/66269 - Third Party Advisory, VDB Entry | |
References | (MISC) http://secpod.org/blog/?p=2158 - Broken Link | |
CPE | cpe:2.3:a:barracudadrive:barracudadrive:3.4:*:*:*:*:*:*:* cpe:2.3:a:barracudadrive:barracudadrive:4.4.3:*:*:*:*:*:*:* cpe:2.3:a:barracudadrive:barracudadrive:5.0:*:*:*:*:*:*:* cpe:2.3:a:barracudadrive:barracudadrive:3.6:*:*:*:*:*:*:* cpe:2.3:a:barracudadrive:barracudadrive:4.5.5:*:*:*:*:*:*:* cpe:2.3:a:barracudadrive:barracudadrive:6.4:*:*:*:*:*:*:* cpe:2.3:a:barracudadrive:barracudadrive:4.6.1:*:*:*:*:*:*:* cpe:2.3:a:barracudadrive:barracudadrive:4.0:*:*:*:*:*:*:* cpe:2.3:a:barracudadrive:barracudadrive:4.4.7:*:*:*:*:*:*:* cpe:2.3:a:barracudadrive:barracudadrive:4.5.3:*:*:*:*:*:*:* cpe:2.3:a:barracudadrive:barracudadrive:4.8.4:*:*:*:*:*:*:* cpe:2.3:a:barracudadrive:barracudadrive:3.8:*:*:*:*:*:*:* cpe:2.3:a:barracudadrive:barracudadrive:4.4.8:*:*:*:*:*:*:* cpe:2.3:a:barracudadrive:barracudadrive:4.4.2:*:*:*:*:*:*:* cpe:2.3:a:barracudadrive:barracudadrive:5.3:*:*:*:*:*:*:* cpe:2.3:a:barracudadrive:barracudadrive:4.6:*:*:*:*:*:*:* cpe:2.3:a:barracudadrive:barracudadrive:4.7:*:*:*:*:*:*:* cpe:2.3:a:barracudadrive:barracudadrive:4.0.1:*:*:*:*:*:*:* cpe:2.3:a:barracudadrive:barracudadrive:6.2:*:*:*:*:*:*:* cpe:2.3:a:barracudadrive:barracudadrive:4.4.4:*:*:*:*:*:*:* cpe:2.3:a:barracudadrive:barracudadrive:4.1:*:*:*:*:*:*:* cpe:2.3:a:barracudadrive:barracudadrive:3.7:*:*:*:*:*:*:* cpe:2.3:a:barracudadrive:barracudadrive:4.5.1:*:*:*:*:*:*:* cpe:2.3:a:barracudadrive:barracudadrive:5.1:*:*:*:*:*:*:* cpe:2.3:a:barracudadrive:barracudadrive:4.9.2:*:*:*:*:*:*:* cpe:2.3:a:barracudadrive:barracudadrive:5.2:*:*:*:*:*:*:* cpe:2.3:a:barracudadrive:barracudadrive:4.4.1:*:*:*:*:*:*:* cpe:2.3:a:barracudadrive:barracudadrive:4.4:*:*:*:*:*:*:* cpe:2.3:a:barracudadrive:barracudadrive:4.4.5:*:*:*:*:*:*:* cpe:2.3:a:barracudadrive:barracudadrive:4.8:*:*:*:*:*:*:* cpe:2.3:a:barracudadrive:barracudadrive:3.9:*:*:*:*:*:*:* cpe:2.3:a:barracudadrive:barracudadrive:4.5.4:*:*:*:*:*:*:* cpe:2.3:a:barracudadrive:barracudadrive:4.5:*:*:*:*:*:*:* cpe:2.3:a:barracudadrive:barracudadrive:4.0.2:*:*:*:*:*:*:* cpe:2.3:a:barracudadrive:barracudadrive:4.5.2:*:*:*:*:*:*:* cpe:2.3:a:barracudadrive:barracudadrive:4.2:*:*:*:*:*:*:* cpe:2.3:a:barracudadrive:barracudadrive:3.7.2:*:*:*:*:*:*:* cpe:2.3:a:barracudadrive:barracudadrive:4.9.1:*:*:*:*:*:*:* cpe:2.3:a:barracudadrive:barracudadrive:3.5:*:*:*:*:*:*:* cpe:2.3:a:barracudadrive:barracudadrive:6.0:*:*:*:*:*:*:* cpe:2.3:a:barracudadrive:barracudadrive:6.1:*:*:*:*:*:*:* cpe:2.3:a:barracudadrive:barracudadrive:4.9:*:*:*:*:*:*:* cpe:2.3:a:realtimelogic:barracudadrive:6.5:*:*:*:*:*:*:* cpe:2.3:a:barracudadrive:barracudadrive:6.3:*:*:*:*:*:*:* cpe:2.3:a:barracudadrive:barracudadrive:4.4.6:*:*:*:*:*:*:* |
|
CVSS |
v2 : v3 : |
v2 : 4.3
v3 : 6.1 |
26 May 2021, 17:30
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:a:realtimelogic:barracudadrive:6.5:*:*:*:*:*:*:* |
Information
Published : 2014-03-25 18:21
Updated : 2024-02-04 18:35
NVD link : CVE-2014-2526
Mitre link : CVE-2014-2526
CVE.ORG link : CVE-2014-2526
JSON object : View
Products Affected
barracudadrive
- barracudadrive
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')