SecurityTracker.com
    Home    |    View Topics    |    Search    |    Contact Us    |   

SecurityTracker
Archives


 


Category:   Device (Encryption/VPN)  >   Barracuda SSL VPN Vendors:   Barracuda Networks
Barracuda SSL VPN Bug Lets Remote Users Bypass Authentication
SecurityTracker Alert ID:  1028039
SecurityTracker URL:  http://securitytracker.com/id/1028039
CVE Reference:   GENERIC-MAP-NOMATCH   (Links to External Site)
Date:  Jan 24 2013
Impact:   Disclosure of system information, Modification of authentication information, User access via network
Fix Available:  Yes  Vendor Confirmed:  Yes  
Version(s): firmware versions 2.2.2.203; prior to SecurityDefinition 2.0.5
Description:   A vulnerability was reported in Barracuda SSL VPN. A remote user can gain administrative access to the target system.

A remote user can set a specially crafted Java system property (via 'setSysProp.jsp') to bypass access restrictions and gain access to the API functionality. This can be exploited to download configuration files, download database dumps, shutdown the system, and set new administrative passwords.

The original advisory is available at:

https://www.sec-consult.com/fxdata/seccons/prod/temedia/advisories_txt/20130124-1_Barracuda_SSL_VPN_Authentication_Bypass_wo_poc_v10.txt

S. Viehbock of SEC Consult reported these vulnerabilities.

Impact:   A remote user can gain administrative access to the target system.
Solution:   The vendor has issued a fix (Security Definition 2.0.5).

The vendor's advisory is available at:

https://www.barracudanetworks.com/support/techalerts#41

Vendor URL:  www.barracudanetworks.com/support/techalerts#41 (Links to External Site)
Cause:   Access control error

Message History:   None.


 Source Message Contents



[Original Message Not Available for Viewing]


Go to the Top of This SecurityTracker Archive Page





Home   |    View Topics   |    Search   |    Contact Us

This web site uses cookies for web analytics. Learn More

Copyright 2021, SecurityGlobal.net LLC