The Bararcuda web firewall 660 with firmware 7.3.1.007 suffers from input validation vulnerabilities that allow for session hijacking and more.
bf65427cf42c5a384779e3d121dfd96b62f502dac235f59d56843334b08a4a7d
BarracudaDrive version 6.5 suffers from a privilege escalation vulnerability.
bd93725c180cdafc139079c727d570922f7d871548126bc0ba7bf1843d4f7cb3
Barracuda Load Balancer Firmware versions 6.0.1.006 (2016-08-19) and below post-authentication remote root exploit.
761cc64c788d41c81b773e2661fb538a8d4516f8a3c77082756bc9a65c69ee93
This Metasploit module exploits a remote command execution vulnerability in the Barracuda Web Application Firewall firmware versions 8.0.1.008 (2016-03-22) and below by exploiting a vulnerability in the web administration interface. By sending a specially crafted request it's possible to inject system commands while escalating to root do to relaxed sudo configuration on the local machine.
e629172103ae4ff6e305d3b64279d72809b63af1ee85c6af41c91df3db7d9d96
This Metasploit module exploits a remote command execution vulnerability in the Barracuda Web App Firewall Firmware Version <= 8.0.1.008 and Load Balancer Firmware <= v5.4.0.004 by exploiting a vulnerability in the web administration interface. By sending a specially crafted request it's possible to inject system commands while escalating to root do to relaxed sudo configurations on the appliances.
ada1acb74888da1ee068093d1bfd8b3f3fa7cbe886c53bffebec80de7451a35e
This Metasploit module exploits a remote command execution vulnerability in the Barracuda Web App Firewall Firmware Version <= 8.0.1.007 and Load Balancer Firmware <= v5.4.0.004 by exploiting a two vulnerabilities in the web administration interface. The first bug leverages a Arbitrary File Upload vulnerability to create a malicious file containing shell commands before using a second bug meant to clean up left-over core files on the device to execute them. By sending a specially crafted requests it's possible to inject system commands while escalating to root do to relaxed sudo configurations on the appliances.
c5cbb5353489330f723faa90c0811bb577e0e6462b9b934b977a12a22fc05e6e
This Metasploit module exploits a remote command execution vulnerability in the Barracuda Web App Firewall Firmware version 8.0.1.007 and below and Load Balancer Firmware versions 5.4.0.004 and below by exploiting a vulnerability in the web administration interface. By sending a specially crafted request it's possible to inject system commands while escalating to root do to relaxed sudo configurations on the appliances.
1140a40daee90570960cfd7f3c6d5cd7ddfbca7468a85535b18619b259be1089
This Metasploit module exploits a remote command execution vulnerability in the Barracuda Spam and Virus firewall firmware versions 5.1.3.007 and below by exploiting a vulnerability in the web administration interface. By sending a specially crafted request it's possible to inject system commands while escalating to root do to relaxed sudo configuration on the local machine.
808ddc4f2e9d4a40b867ca92e98217e9170d718d92040b6e9e8b3c8f3b5a6144
This Metasploit module exploits a remote command execution vulnerability in Barracuda Firmware versions 5.0.0.012 and below by exploiting a vulnerability in the web administration interface. By sending a specially crafted request it's possible to inject system commands while escalating to root do to relaxed sudo configuration on the local machine.
47ed3ef4957c8e0f48670b15bb88acf48f64853701b5565f1f077b80177cbc5a
It is possible to re-use a link which includes a non-expiring authentication token in the query string to gain access to the interface of the Barracuda Web Application Firewall (WAF) firmware version 7.8.1.013.
49b95080b97fed1ca7fc8d3aa3dfef41e6c259c643023705114b6de832727218
BarracudaDrive version 6.7.2 suffers from cross site scripting vulnerabilities in the administrative panel.
5c6c8a50ef195216ce00593e8168ec1c27fc28b8f6fa774cc26bd199c3f20acb
BarracudaDrive version 6.7.2 suffers from multiple reflective and persistent cross site scripting vulnerabilities.
d41472b73eb1e68306169abb69831256e5000c2d91afe4d895f79081b2bd8cb6
The webfilter.barracuda.com site suffers from a cross site scripting vulnerability.
e3a7422285092a60908c973680b6fe8b7fd4bae6300e974dfac0f73147afea8b
Microsoft Windows 7 Ultimate SP1 32 bit and 64 bit suffers from a RPC denial of service vulnerability due to mishandling of malformed DHCPv6 packets.
c5dce36fdf75da8e6e2691aa8865253724e1cb7f7bd8fe3cf50839029dafad31
It is possible to execute an arbitrary command with root privileges on phion netfence 4.0.x, phion netfence versions prior to 4.2.15 and NG Firewall versions prior to 5.0.2 boxes with activated external authentication scheme (i.e. Active Directory). An attacker with the knowledge of an admin's username is able to perform arbitrary shell commands during the ssh login procedure on the box. The knowledge of the admin's password is not required.
fee59e2c3c8776e6ab9ed6abb4364a9562154ddc30dfed06de24b65179dd71f4
Barracuda Networks Spam and Virus Firewall versions 4.1.1.021 and below remote configuration retrieval exploit.
165ba97992e737fdb6fac9ce7c4bbf11e171a5ef6e1c4b1cdecc39389d32668d
This Metasploit module exploits an arbitrary command execution vulnerability in the Barracuda Spam Firewall appliance. Versions prior to 3.1.18 are vulnerable.
98f68f02962b87f0c2a1221f7accf276203796571faa6c22c97dc9329849ad36
The Barracuda Load Balancer suffers from a cross site scripting vulnerability in the administrative login page.
bd1a465b7c8636565891d6bdd55c17fddb190b74d3e036f23b79085daa3a71cb
The Barracuda Networks Message Archiver product is vulnerable to persistent and reflect cross site scripting attacks.
7d5ba643cb91e384c25bc6c8b9b798506aa2c146a0eb1e25cdc27fb3cdcc863e
The Barracuda Networks Spam Firewall is vulnerable to various remote SQL injection attacks.
4a06cf636ddf600a8fa7b1e3104ca846b7810df35ab3c3da2a438c7b755bd9e4
The Barracuda Spam Firewall device web administration interface is vulnerable to a reflected cross site scripting vulnerability which may allow theft of administrative credentials or downloading of malicious content. IRM confirmed the presence of this vulnerability in Barracuda Spam Firewall 600 Firmware 3.5.11.020. The vendor has confirmed the issue exists in all versions prior to 3.5.11.025.
9f40b815888c87cdeb682e726a415b2f57a0e4e96a16e1c928489289784a80fb
The BarracudaDrive Web Server versions 3.7.2 and below suffer from directory traversal, arbitrary file deletion, and multiple other vulnerabilities.
5626496a320fd4246ac45a177c0c9fc59dd1caf3a99a693f1a96ad7f61f17809
Lack of input sanitization in the Linux based Barracuda spam firewall web interface allows execution of commands by unauthenticated users. Combined with privilege elevation techniques, execution of commands as the root user is possible allowing a full system compromise.
b6fbee81267f573a9e3a6ebdd95df93304d4a2182a2a5d2f92be17db98ef260d
The Barracuda Spam Firewall with firmware less than 3.3.03.022 and spamdef less than 3.0.10045 suffers from a remote compromise via an email containing a specially crafted LHA archive.
1fc543a965dad878e85c76e8374b6bf456536444e43cef102ce41c68fd3b54f1
The Barracuda Spam Firewall with firmware less than 3.3.03.022 and spamdef less than 3.0.9388 suffers from a remote compromise via an email containing a specially crafted ZOO archive.
b1a125d11ebe95bcf9be62768a67891c17278898c0cd6217c2f1e78f625b5082
Short white paper discussing some questionable circumstances surrounding the Barracuda Spam Firewall appliances.
e377627c8b875d81d5252b300f778362107dd0e56c83e2b4687e96dc8f2ba9f5