Описание
On Barracuda CloudGen WAN Private Edge Gateway devices before 8 webui-sdwan-1089-8.3.1-174141891, an OS command injection vulnerability exists in /ajax/update_certificate - a crafted HTTP request allows an authenticated attacker to execute arbitrary commands. For example, a name field can contain :password and a password field can contain shell metacharacters.
On Barracuda CloudGen WAN Private Edge Gateway devices before 8 webui-sdwan-1089-8.3.1-174141891, an OS command injection vulnerability exists in /ajax/update_certificate - a crafted HTTP request allows an authenticated attacker to execute arbitrary commands. For example, a name field can contain :password and a password field can contain shell metacharacters.
Ссылки
- https://nvd.nist.gov/vuln/detail/CVE-2023-26213
- https://campus.barracuda.com/product/cloudgenwan/doc/96024723/release-notes-8-3-1
- https://sec-consult.com/vulnerability-lab/advisory/os-command-injection-in-barracuda-cloudgen-wan
- https://www.barracuda.com/products/network-security/cloudgen-wan
- http://seclists.org/fulldisclosure/2023/Mar/2
Связанные уязвимости
On Barracuda CloudGen WAN Private Edge Gateway devices before 8 webui-sdwan-1089-8.3.1-174141891, an OS command injection vulnerability exists in /ajax/update_certificate - a crafted HTTP request allows an authenticated attacker to execute arbitrary commands. For example, a name field can contain :password and a password field can contain shell metacharacters.
Уязвимость веб-интерфейса межсетевого экрана Barracuda CloudGen WAN, позволяющая нарушителю выполнить произвольные команды