On Barracuda CloudGen WAN Private Edge Gateway devices before 8 webui-sdwan-1089-8.3.1-174141891, an OS command injection vulnerability exists in /ajax/update_certificate - a crafted HTTP request allows an authenticated attacker to execute arbitrary commands. For example, a name field can contain :password and a password field can contain shell metacharacters.
References
Link | Resource |
---|---|
http://seclists.org/fulldisclosure/2023/Mar/2 | Exploit Mailing List Third Party Advisory |
https://campus.barracuda.com/product/cloudgenwan/doc/96024723/release-notes-8-3-1/ | Release Notes |
https://sec-consult.com/vulnerability-lab/advisory/os-command-injection-in-barracuda-cloudgen-wan/ | Exploit Third Party Advisory |
https://www.barracuda.com/products/network-security/cloudgen-wan | Product |
http://seclists.org/fulldisclosure/2023/Mar/2 | Exploit Mailing List Third Party Advisory |
https://campus.barracuda.com/product/cloudgenwan/doc/96024723/release-notes-8-3-1/ | Release Notes |
https://sec-consult.com/vulnerability-lab/advisory/os-command-injection-in-barracuda-cloudgen-wan/ | Exploit Third Party Advisory |
https://www.barracuda.com/products/network-security/cloudgen-wan | Product |
Configurations
Configuration 1 (hide)
AND |
|
Configuration 2 (hide)
AND |
|
Configuration 3 (hide)
AND |
|
Configuration 4 (hide)
AND |
|
Configuration 5 (hide)
AND |
|
Configuration 6 (hide)
AND |
|
Configuration 7 (hide)
AND |
|
History
21 Nov 2024, 07:50
Type | Values Removed | Values Added |
---|---|---|
References | () http://seclists.org/fulldisclosure/2023/Mar/2 - Exploit, Mailing List, Third Party Advisory | |
References | () https://campus.barracuda.com/product/cloudgenwan/doc/96024723/release-notes-8-3-1/ - Release Notes | |
References | () https://sec-consult.com/vulnerability-lab/advisory/os-command-injection-in-barracuda-cloudgen-wan/ - Exploit, Third Party Advisory | |
References | () https://www.barracuda.com/products/network-security/cloudgen-wan - Product |
10 Mar 2023, 14:53
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:h:barracuda:t600d:-:*:*:*:*:*:*:* cpe:2.3:o:barracuda:t400c_firmware:8.3.1:-:*:*:*:*:*:* cpe:2.3:o:barracuda:t100b_firmware:8.3.1:-:*:*:*:*:*:* cpe:2.3:h:barracuda:t200c:-:*:*:*:*:*:*:* cpe:2.3:h:barracuda:t100b:-:*:*:*:*:*:*:* cpe:2.3:h:barracuda:t900b:-:*:*:*:*:*:*:* cpe:2.3:o:barracuda:t600d_firmware:8.3.1:-:*:*:*:*:*:* cpe:2.3:h:barracuda:t400c:-:*:*:*:*:*:*:* cpe:2.3:o:barracuda:t200c_firmware:8.3.1:-:*:*:*:*:*:* cpe:2.3:o:barracuda:t900b_firmware:8.3.1:-:*:*:*:*:*:* cpe:2.3:h:barracuda:t93a:-:*:*:*:*:*:*:* cpe:2.3:h:barracuda:t193a:-:*:*:*:*:*:*:* cpe:2.3:o:barracuda:t93a_firmware:8.3.1:-:*:*:*:*:*:* cpe:2.3:o:barracuda:t193a_firmware:8.3.1:-:*:*:*:*:*:* |
|
CWE | CWE-78 | |
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 7.2 |
References | (MISC) https://sec-consult.com/vulnerability-lab/advisory/os-command-injection-in-barracuda-cloudgen-wan/ - Exploit, Third Party Advisory | |
References | (CONFIRM) https://campus.barracuda.com/product/cloudgenwan/doc/96024723/release-notes-8-3-1/ - Release Notes | |
References | (FULLDISC) http://seclists.org/fulldisclosure/2023/Mar/2 - Exploit, Mailing List, Third Party Advisory | |
References | (MISC) https://www.barracuda.com/products/network-security/cloudgen-wan - Product |
03 Mar 2023, 22:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2023-03-03 22:15
Updated : 2024-11-21 07:50
NVD link : CVE-2023-26213
Mitre link : CVE-2023-26213
CVE.ORG link : CVE-2023-26213
JSON object : View
Products Affected
barracuda
- t93a
- t100b
- t93a_firmware
- t900b_firmware
- t400c_firmware
- t600d
- t100b_firmware
- t600d_firmware
- t193a
- t200c_firmware
- t200c
- t900b
- t400c
- t193a_firmware
CWE
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')