Title: ====== Barracuda CudaTel v2.0.029.1 - Multiple Web Vulnerabilities Date: ===== 2012-03-08 References: =========== http://www.vulnerability-lab.com/get_content.php?id=442 VL-ID: ===== 442 Introduction: ============= Designed to enable seamless voice and video communication, the CudaTel Communication Server is an easy-to-use, affordable, next-generation phone system for businesses. CudaTel Communication Server s enterprise-class feature set includes Voice over IP (VoIP) PBX services, conferencing, follow-me, automated attendant services, and more, controlled by an easy-to-use Web interface. CudaTel Communication Server is compatible with any SIP device and provider, and can be pre-configured for use with both analog and digital telephone networks. Powerful, Complete Solution With an expansive feature set and and no per user or phone licensing fees, the CudaTel Communication Server is equipped and priced for organizations of any size. Native High Definition audio support and integrated phone line (TDM) hardware produces an unparalleled audio experience. VOIP encryption protects calls from hackers and digital eavesdroppers. (Copy of the Vendor Homepage: http://www.barracudanetworks.ca/cudatel.aspx ) Abstract: ========= Vulnerability Lab Team discovered multiple persistent Web Vulnerabilities on Barracudas CudaTel Phone Application v3.0.028.001. Report-Timeline: ================ 2012-02-19: Vendor Notification 2012-02-00: Vendor Response/Feedback 2012-03-07: Vendor Fix/Patch by Check 2012-03-08: Public or Non-Public Disclosure Status: ======== Published Affected Products: ================== Barracuda Networks Product: CudaTel - Communication Server v2.0.029.1 Exploitation-Technique: ======================= Remote Severity: ========= High Details: ======== Multiple persistent Input Validation vulnerabilities are detected on Barracudas CudaTel Phone Application v3.0.028.001. Local low privileged user accounts can implement/inject malicious script code to manipulate modules via persistent context requests. When exploited by an authenticated user, the identified vulnerabilities can result in information disclosure via error, session hijacking, access to available phone line services, manipulated persistent context execution out of the auto route listings. Vulnerable Module(s): [+] Automated Attendants [-] Advanced Routing extension - NAME & Listing [-] Auto Attendants - NAME & Listing [-] ALL Types Listing Category Picture(s): ../1.png ../2.png Proof of Concept: ================= The vulnerabilities can be exploited by local privileged user accounts with low user inter action or remote via manipulated http request & high required user inter action. For demonstration or reproduce ... Code Review: Listing Category (All; Routing Extension; Auto Attendants) [EXECUTION OF PERSISTENT SCRIPT CODE]
">