exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 25 of 25 RSS Feed

Files

Barracuda Web Firewall 660 Firmware 7.3.1.007 Input Validation
Posted Dec 21, 2009
Authored by Global-Evolution

The Bararcuda web firewall 660 with firmware 7.3.1.007 suffers from input validation vulnerabilities that allow for session hijacking and more.

tags | exploit, web, vulnerability
SHA-256 | bf65427cf42c5a384779e3d121dfd96b62f502dac235f59d56843334b08a4a7d

Related Files

BarracudaDrive 6.5 Local Privilege Escalation
Posted Aug 10, 2020
Authored by Bobby Cooke, hyd3sec

BarracudaDrive version 6.5 suffers from a privilege escalation vulnerability.

tags | exploit
SHA-256 | bd93725c180cdafc139079c727d570922f7d871548126bc0ba7bf1843d4f7cb3
Barracuda Load Balancer Firmware 6.0.1.006 Remote Root
Posted Jul 18, 2017
Authored by Russell Sanford

Barracuda Load Balancer Firmware versions 6.0.1.006 (2016-08-19) and below post-authentication remote root exploit.

tags | exploit, remote, root
advisories | CVE-2017-6320
SHA-256 | 761cc64c788d41c81b773e2661fb538a8d4516f8a3c77082756bc9a65c69ee93
Barracuda Web Application Firewall 8.0.1.008 Post Auth Root
Posted Jul 29, 2016
Authored by Russell Sanford | Site metasploit.com

This Metasploit module exploits a remote command execution vulnerability in the Barracuda Web Application Firewall firmware versions 8.0.1.008 (2016-03-22) and below by exploiting a vulnerability in the web administration interface. By sending a specially crafted request it's possible to inject system commands while escalating to root do to relaxed sudo configuration on the local machine.

tags | exploit, remote, web, local, root
SHA-256 | e629172103ae4ff6e305d3b64279d72809b63af1ee85c6af41c91df3db7d9d96
Barracuda Web App Firewall/Load Balancer Post Auth Remote Root Exploit (3)
Posted Jul 28, 2016
Authored by Russell Sanford | Site metasploit.com

This Metasploit module exploits a remote command execution vulnerability in the Barracuda Web App Firewall Firmware Version <= 8.0.1.008 and Load Balancer Firmware <= v5.4.0.004 by exploiting a vulnerability in the web administration interface. By sending a specially crafted request it's possible to inject system commands while escalating to root do to relaxed sudo configurations on the appliances.

tags | exploit, remote, web, root
SHA-256 | ada1acb74888da1ee068093d1bfd8b3f3fa7cbe886c53bffebec80de7451a35e
Barracuda Web App Firewall/Load Balancer Post Auth Remote Root Exploit (2)
Posted Jul 26, 2016
Authored by Russell Sanford | Site metasploit.com

This Metasploit module exploits a remote command execution vulnerability in the Barracuda Web App Firewall Firmware Version <= 8.0.1.007 and Load Balancer Firmware <= v5.4.0.004 by exploiting a two vulnerabilities in the web administration interface. The first bug leverages a Arbitrary File Upload vulnerability to create a malicious file containing shell commands before using a second bug meant to clean up left-over core files on the device to execute them. By sending a specially crafted requests it's possible to inject system commands while escalating to root do to relaxed sudo configurations on the appliances.

tags | exploit, remote, web, arbitrary, shell, root, vulnerability, file upload
SHA-256 | c5cbb5353489330f723faa90c0811bb577e0e6462b9b934b977a12a22fc05e6e
Barracuda Web App Firewall / Load Balancer Remote Root
Posted Jul 22, 2016
Authored by Russell Sanford | Site metasploit.com

This Metasploit module exploits a remote command execution vulnerability in the Barracuda Web App Firewall Firmware version 8.0.1.007 and below and Load Balancer Firmware versions 5.4.0.004 and below by exploiting a vulnerability in the web administration interface. By sending a specially crafted request it's possible to inject system commands while escalating to root do to relaxed sudo configurations on the appliances.

tags | exploit, remote, web, root
SHA-256 | 1140a40daee90570960cfd7f3c6d5cd7ddfbca7468a85535b18619b259be1089
Barracuda Spam And Virus Firewall 5.1.3.007 Remote Root
Posted Jul 22, 2016
Authored by Russell Sanford | Site metasploit.com

This Metasploit module exploits a remote command execution vulnerability in the Barracuda Spam and Virus firewall firmware versions 5.1.3.007 and below by exploiting a vulnerability in the web administration interface. By sending a specially crafted request it's possible to inject system commands while escalating to root do to relaxed sudo configuration on the local machine.

tags | exploit, remote, web, local, root, virus
SHA-256 | 808ddc4f2e9d4a40b867ca92e98217e9170d718d92040b6e9e8b3c8f3b5a6144
Barracuda Firmware 5.0.0.012 Post-Auth Remote Root
Posted Apr 9, 2015
Authored by Russell Sanford | Site metasploit.com

This Metasploit module exploits a remote command execution vulnerability in Barracuda Firmware versions 5.0.0.012 and below by exploiting a vulnerability in the web administration interface. By sending a specially crafted request it's possible to inject system commands while escalating to root do to relaxed sudo configuration on the local machine.

tags | exploit, remote, web, local, root
SHA-256 | 47ed3ef4957c8e0f48670b15bb88acf48f64853701b5565f1f077b80177cbc5a
Barracuda WAF Authentication Bypass
Posted Aug 4, 2014
Authored by Nick Hayes | Site portcullis-security.com

It is possible to re-use a link which includes a non-expiring authentication token in the query string to gain access to the interface of the Barracuda Web Application Firewall (WAF) firmware version 7.8.1.013.

tags | exploit, web, bypass
advisories | CVE-2014-2595
SHA-256 | 49b95080b97fed1ca7fc8d3aa3dfef41e6c259c643023705114b6de832727218
BarracudaDrive 6.7.2 Cross Site Scripting
Posted Jun 17, 2014
Authored by Govind Singh

BarracudaDrive version 6.7.2 suffers from cross site scripting vulnerabilities in the administrative panel.

tags | exploit, vulnerability, xss
SHA-256 | 5c6c8a50ef195216ce00593e8168ec1c27fc28b8f6fa774cc26bd199c3f20acb
BarracudaDrive 6.7.2 Cross Site Scripting
Posted May 16, 2014
Authored by Manish Tanwar

BarracudaDrive version 6.7.2 suffers from multiple reflective and persistent cross site scripting vulnerabilities.

tags | exploit, vulnerability, xss
SHA-256 | d41472b73eb1e68306169abb69831256e5000c2d91afe4d895f79081b2bd8cb6
Barracuda Webfilter Cross Site Scripting
Posted Mar 9, 2012
Authored by Sony

The webfilter.barracuda.com site suffers from a cross site scripting vulnerability.

tags | exploit, xss
SHA-256 | e3a7422285092a60908c973680b6fe8b7fd4bae6300e974dfac0f73147afea8b
Microsoft Windows 7 Ultimate RPC Denial Of Service
Posted Aug 16, 2011
Authored by Michael Burgbacher, Thomas Unterleitner | Site barracudanetworks.com

Microsoft Windows 7 Ultimate SP1 32 bit and 64 bit suffers from a RPC denial of service vulnerability due to mishandling of malformed DHCPv6 packets.

tags | advisory, denial of service
systems | windows
SHA-256 | c5dce36fdf75da8e6e2691aa8865253724e1cb7f7bd8fe3cf50839029dafad31
Barracuda NG Firewall Remote Command Execution
Posted Jun 12, 2011
Authored by Lukas Nothdurfter, Wolfgang Neudorfer

It is possible to execute an arbitrary command with root privileges on phion netfence 4.0.x, phion netfence versions prior to 4.2.15 and NG Firewall versions prior to 5.0.2 boxes with activated external authentication scheme (i.e. Active Directory). An attacker with the knowledge of an admin's username is able to perform arbitrary shell commands during the ssh login procedure on the box. The knowledge of the admin's password is not required.

tags | advisory, arbitrary, shell, root
SHA-256 | fee59e2c3c8776e6ab9ed6abb4364a9562154ddc30dfed06de24b65179dd71f4
Barracuda Networks Spam And Virus Firewall Configuration Retrieval
Posted Sep 28, 2010
Authored by ShadowHatesYou

Barracuda Networks Spam and Virus Firewall versions 4.1.1.021 and below remote configuration retrieval exploit.

tags | exploit, remote, virus
SHA-256 | 165ba97992e737fdb6fac9ce7c4bbf11e171a5ef6e1c4b1cdecc39389d32668d
Barracuda IMG.PL Remote Command Execution
Posted Oct 30, 2009
Authored by Nicolas Gregoire

This Metasploit module exploits an arbitrary command execution vulnerability in the Barracuda Spam Firewall appliance. Versions prior to 3.1.18 are vulnerable.

tags | exploit, arbitrary
advisories | CVE-2005-2847
SHA-256 | 98f68f02962b87f0c2a1221f7accf276203796571faa6c22c97dc9329849ad36
Barracuda Load Balancer XSS
Posted Feb 13, 2009
Authored by Jan Skovgren | Site fortconsult.net

The Barracuda Load Balancer suffers from a cross site scripting vulnerability in the administrative login page.

tags | exploit, xss
SHA-256 | bd1a465b7c8636565891d6bdd55c17fddb190b74d3e036f23b79085daa3a71cb
Barracuda Message Archiver
Posted Dec 16, 2008
Authored by Dr. Marian Ventuneac

The Barracuda Networks Message Archiver product is vulnerable to persistent and reflect cross site scripting attacks.

tags | exploit, xss
advisories | CVE-2008-0971
SHA-256 | 7d5ba643cb91e384c25bc6c8b9b798506aa2c146a0eb1e25cdc27fb3cdcc863e
Barracuda Spam Firewall SQL Injection
Posted Dec 16, 2008
Authored by Dr. Marian Ventuneac

The Barracuda Networks Spam Firewall is vulnerable to various remote SQL injection attacks.

tags | exploit, remote, sql injection
advisories | CVE-2008-1094
SHA-256 | 4a06cf636ddf600a8fa7b1e3104ca846b7810df35ab3c3da2a438c7b755bd9e4
barracuda-xss.txt
Posted May 22, 2008
Site irmplc.com

The Barracuda Spam Firewall device web administration interface is vulnerable to a reflected cross site scripting vulnerability which may allow theft of administrative credentials or downloading of malicious content. IRM confirmed the presence of this vulnerability in Barracuda Spam Firewall 600 Firmware 3.5.11.020. The vendor has confirmed the issue exists in all versions prior to 3.5.11.025.

tags | exploit, web, xss
advisories | CVE-2008-2333
SHA-256 | 9f40b815888c87cdeb682e726a415b2f57a0e4e96a16e1c928489289784a80fb
barracuda-multi.txt
Posted Dec 11, 2007
Authored by Luigi Auriemma | Site aluigi.org

The BarracudaDrive Web Server versions 3.7.2 and below suffer from directory traversal, arbitrary file deletion, and multiple other vulnerabilities.

tags | exploit, web, arbitrary, vulnerability
SHA-256 | 5626496a320fd4246ac45a177c0c9fc59dd1caf3a99a693f1a96ad7f61f17809
barracudaExec.txt
Posted Aug 18, 2006
Authored by Matthew Hall

Lack of input sanitization in the Linux based Barracuda spam firewall web interface allows execution of commands by unauthenticated users. Combined with privilege elevation techniques, execution of commands as the root user is possible allowing a full system compromise.

tags | exploit, web, root
systems | linux
SHA-256 | b6fbee81267f573a9e3a6ebdd95df93304d4a2182a2a5d2f92be17db98ef260d
barracuda-advisory-LHA.txt
Posted Apr 4, 2006
Authored by Jean-Sebastien Guay-Leroux | Site guay-leroux.com

The Barracuda Spam Firewall with firmware less than 3.3.03.022 and spamdef less than 3.0.10045 suffers from a remote compromise via an email containing a specially crafted LHA archive.

tags | advisory, remote
SHA-256 | 1fc543a965dad878e85c76e8374b6bf456536444e43cef102ce41c68fd3b54f1
barracuda-advisory-ZOO.txt
Posted Apr 4, 2006
Authored by Jean-Sebastien Guay-Leroux | Site guay-leroux.com

The Barracuda Spam Firewall with firmware less than 3.3.03.022 and spamdef less than 3.0.9388 suffers from a remote compromise via an email containing a specially crafted ZOO archive.

tags | advisory, remote
SHA-256 | b1a125d11ebe95bcf9be62768a67891c17278898c0cd6217c2f1e78f625b5082
Barracuda_Evil.txt
Posted Dec 30, 2004
Authored by Ben Lentz

Short white paper discussing some questionable circumstances surrounding the Barracuda Spam Firewall appliances.

tags | paper
SHA-256 | e377627c8b875d81d5252b300f778362107dd0e56c83e2b4687e96dc8f2ba9f5
Page 1 of 1
Back1Next

File Archive:

June 2023

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Jun 1st
    18 Files
  • 2
    Jun 2nd
    13 Files
  • 3
    Jun 3rd
    0 Files
  • 4
    Jun 4th
    0 Files
  • 5
    Jun 5th
    32 Files
  • 6
    Jun 6th
    0 Files
  • 7
    Jun 7th
    0 Files
  • 8
    Jun 8th
    0 Files
  • 9
    Jun 9th
    0 Files
  • 10
    Jun 10th
    0 Files
  • 11
    Jun 11th
    0 Files
  • 12
    Jun 12th
    0 Files
  • 13
    Jun 13th
    0 Files
  • 14
    Jun 14th
    0 Files
  • 15
    Jun 15th
    0 Files
  • 16
    Jun 16th
    0 Files
  • 17
    Jun 17th
    0 Files
  • 18
    Jun 18th
    0 Files
  • 19
    Jun 19th
    0 Files
  • 20
    Jun 20th
    0 Files
  • 21
    Jun 21st
    0 Files
  • 22
    Jun 22nd
    0 Files
  • 23
    Jun 23rd
    0 Files
  • 24
    Jun 24th
    0 Files
  • 25
    Jun 25th
    0 Files
  • 26
    Jun 26th
    0 Files
  • 27
    Jun 27th
    0 Files
  • 28
    Jun 28th
    0 Files
  • 29
    Jun 29th
    0 Files
  • 30
    Jun 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close