On Barracuda CloudGen WAN Private Edge Gateway devices before 8 webui-sdwan-1089-8.3.1-174141891, an OS command injection vulnerability exists in /ajax/update_certificate - a crafted HTTP request allows an authenticated attacker to execute arbitrary commands. For example, a name field can contain :password and a password field can contain shell metacharacters.
References
Link | Resource |
---|---|
http://seclists.org/fulldisclosure/2023/Mar/2 | Exploit Mailing List Third Party Advisory |
https://campus.barracuda.com/product/cloudgenwan/doc/96024723/release-notes-8-3-1/ | Release Notes |
https://sec-consult.com/vulnerability-lab/advisory/os-command-injection-in-barracuda-cloudgen-wan/ | Exploit Third Party Advisory |
https://www.barracuda.com/products/network-security/cloudgen-wan | Product |
Configurations
Configuration 1 (hide)
AND |
|
Configuration 2 (hide)
AND |
|
Configuration 3 (hide)
AND |
|
Configuration 4 (hide)
AND |
|
Configuration 5 (hide)
AND |
|
Configuration 6 (hide)
AND |
|
Configuration 7 (hide)
AND |
|
History
No history.
Information
Published : 2023-03-03 22:15
Updated : 2024-02-28 19:51
NVD link : CVE-2023-26213
Mitre link : CVE-2023-26213
CVE.ORG link : CVE-2023-26213
JSON object : View
Products Affected
barracuda
- t200c
- t93a_firmware
- t193a
- t900b
- t400c_firmware
- t100b_firmware
- t600d_firmware
- t600d
- t93a
- t193a_firmware
- t200c_firmware
- t900b_firmware
- t400c
- t100b
CWE
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')