Barracuda Web Application Firewall (WAF) 7.8.1.013 allows remote attackers to bypass authentication by leveraging a permanent authentication token obtained from a query string.
References
Configurations
History
21 Nov 2024, 02:06
Type | Values Removed | Values Added |
---|---|---|
References | () http://packetstormsecurity.com/files/127740/Barracuda-WAF-Authentication-Bypass.html - Exploit, Third Party Advisory, VDB Entry | |
References | () http://seclists.org/fulldisclosure/2014/Aug/5 - Exploit, Mailing List, Third Party Advisory | |
References | () http://www.osvdb.org/109782 - Broken Link | |
References | () https://vulners.com/securityvulns/SECURITYVULNS:DOC:31004 - Exploit, Third Party Advisory | |
References | () https://www.exploit-db.com/exploits/39278 - Exploit, Third Party Advisory, VDB Entry | |
References | () https://www.portcullis-security.com/security-research-and-downloads/security-advisories/cve-2014-2595/ - Broken Link | |
References | () https://www.securityfocus.com/bid/69028 - Exploit, Third Party Advisory, VDB Entry |
Information
Published : 2020-02-12 01:15
Updated : 2024-11-21 02:06
NVD link : CVE-2014-2595
Mitre link : CVE-2014-2595
CVE.ORG link : CVE-2014-2595
JSON object : View
Products Affected
barracuda
- web_application_firewall
CWE
CWE-613
Insufficient Session Expiration