Barracuda Web Application Firewall (WAF) 7.8.1.013 allows remote attackers to bypass authentication by leveraging a permanent authentication token obtained from a query string.
References
Link | Resource |
---|---|
http://packetstormsecurity.com/files/127740/Barracuda-WAF-Authentication-Bypass.html | Exploit Third Party Advisory VDB Entry |
http://seclists.org/fulldisclosure/2014/Aug/5 | Exploit Mailing List Third Party Advisory |
http://www.osvdb.org/109782 | Broken Link |
https://vulners.com/securityvulns/SECURITYVULNS:DOC:31004 | Exploit Third Party Advisory |
https://www.exploit-db.com/exploits/39278 | Exploit Third Party Advisory VDB Entry |
https://www.portcullis-security.com/security-research-and-downloads/security-advisories/cve-2014-2595/ | Broken Link |
https://www.securityfocus.com/bid/69028 | Exploit Third Party Advisory VDB Entry |
Configurations
History
No history.
Information
Published : 2020-02-12 01:15
Updated : 2024-02-28 17:28
NVD link : CVE-2014-2595
Mitre link : CVE-2014-2595
CVE.ORG link : CVE-2014-2595
JSON object : View
Products Affected
barracuda
- web_application_firewall
CWE
CWE-613
Insufficient Session Expiration