Home    |    View Topics    |    Search    |    Contact Us    |   



Category:   Device (Firewall)  >   Barracuda Web Application Firewall Vendors:   Barracuda Networks
Barracuda Web Application Firewall Reusable URL-Based Authentication Tokens Let Remote Users Bypass Authentication
SecurityTracker Alert ID:  1030665
SecurityTracker URL:
CVE Reference:   CVE-2014-2595   (Links to External Site)
Date:  Aug 4 2014
Impact:   User access via network
Vendor Confirmed:  Yes  Exploit Included:  Yes  
Version(s): firmware version
Description:   A vulnerability was reported in Barracuda Web Application Firewall. A remote user can execute arbitrary code on the target system.

A remote user with access to a non-expiring authentication token from a query string can re-use the authentication token to gain access to the firewall interface.

The vendor was notified on March 5, 2014.

The original advisory is available at:

Nick Hayes of Portcullis Computer Security Limited reported this vulnerability.

Impact:   A remote user can bypass authentication to gain access to the target system.
Solution:   No solution was available at the time of this entry.
Vendor URL: (Links to External Site)
Cause:   Authentication error

Message History:   None.

 Source Message Contents

Subject:  [FD] CVE-2014-2595 - Authentication Bypass in Barracuda Web Application Firewall

Vulnerability title: Authentication Bypass in Barracuda Web Application
CVE: CVE-2014-2595
Vendor: Barracuda
Product: Web Application Firewall
Affected version: Firmware v7.8.1.013
Fixed version: N/A
Reported by: Nick Hayes


It is possible to re-use a link which includes a non-expiring
authentication token in the query string to gain access to the interface
of the Barracuda Web Application Firewall (WAF) firmware version


The above link opens up the Request Limit Policies on the Barracuda labs
WAF test host as the Guest user. This has been confirmed to work on
actual devices and with administrative accounts.

Further details at:

Copyright (c) Portcullis Computer Security Limited 2014, All rights
reserved worldwide. Permission is hereby granted for the electronic
redistribution of this information. It is not to be edited or altered in
any way without the express written consent of Portcullis Computer
Security Limited.

The information herein contained may change without notice. Use of this
information constitutes acceptance for use in an AS IS condition. There
are NO warranties, implied or otherwise, with regard to this information
or its use. Any use of this information is at the user's risk. In no
event shall the author/distributor (Portcullis Computer Security
Limited) be held liable for any damages whatsoever arising out of or in
connection with the use or spread of this information.

Sent through the Full Disclosure mailing list
Web Archives & RSS:

Go to the Top of This SecurityTracker Archive Page

Home   |    View Topics   |    Search   |    Contact Us

This web site uses cookies for web analytics. Learn More

Copyright 2021, LLC