网站地图    收藏   

主页 > 后端 > 网站安全 >

Barracuda Control Center 620多个缺陷及修复 - 网站安全

来源:自学PHP网    时间:2015-04-17 13:03 作者: 阅读:

[导读] 标题:======Barracuda Control Center 620 - Multiple Web Vulnerabilities程序介绍=============Barracuda Networks - Worldwide leader in email and Web security.Control Center Applicat......

 

标题:

======

Barracuda Control Center 620 - Multiple Web Vulnerabilities

 

程序介绍

=============

Barracuda Networks - Worldwide leader in email and Web security.

Control Center Application of Barracuda Networks

 

(Copy of the Vendor Homepage: http://www.barracudanetworks.com/ns/products/)

 

 

影响

=========

Vulnerability-lab Team discovered multiple Web  Vulnerabilities on Barracuda Control Center 620 appliance/application.

 

状态:

========

已发布

 

影响产品

==================

 

Exploitation-Technique:

=======================

Remote

 

 

Severity:

=========

Medium

 

 

技术日记:

========

1.1

Multiple persistent Input Validation vulnerabilities are detected on Barracudas Control Center 620. Local low privileged user account can

implement/inject malicious persistent script code. When exploited by an authenticated user, the identified vulnerabilities

can lead to information disclosure, access to intranet available servers, manipulated persistent content.

 

Vulnerable Module(s): (Persistent)

                                        [+] authdblookup -input

 

1.2

Multiple non-persistent Input Validation vulnerabilities are detected on Barracudas Control Center 620 appliance.

Attackers can form malicious client-side requests to hijack customer/admin sessions.

Successful exploitation requires user inter action & can lead to information disclosure, session

hijacking and access to servers in the intranet.

 

Vulnerable Module(s): (Non-Persistent)

                                        [+] editdevices

                                        [+] main

 

 

Picture(s):

                                        ../control1.png

                                        ../control2.png

                                        ../control3.png

 

 

Proof of Concept:

=================

The vulnerabilities can be exploited by low privileged user accounts or remote attacker via high required user inter action.

For demonstration or reproduce ...

 

1.1 Persistent

https://www.2cto.com /bcc/authdblookup-input.jsp?selected-user=guest@barracuda.com&selected-node=

 

Manually reproduce ...

1. Login

2. Switch to the vulnerable authdblookup-input.jsp  add mask

3. Include your own malicious persistent script code (java-script or html) & save the input

4. The stored script code will be executed in main-bar as stable output result (persistent)

 

1.2  Non-Persistent

https://www.2cto.com /bcc/editdevices.jsp?device-type=spyware&selected-node=1&containerid=[IVE]

https://www.2cto.com /bcc/main.jsp?device-type=[IVE]

 

 

Solution:

=========

Barracuda implemented after the issues 2011 a validation mask to filter malicious & disallowed inputs.

The barracuda firmware of the filter has been update multiple times.

 

 

Risk:

=====

1.1

The security risk of the discovered persistent vulnerabilities are estimated as medium(+) because of low required user inter action.

 

1.2

The security risk of the discovered non-persistent vulnerabilities are estimated as low because of high required user inter action.

 

 

Credits:

========

Vulnerability Research Laboratory - Pim J.F. Campers (X4lt)

 

自学PHP网专注网站建设学习,PHP程序学习,平面设计学习,以及操作系统学习

京ICP备14009008号-1@版权所有www.zixuephp.com

网站声明:本站所有视频,教程都由网友上传,站长收集和分享给大家学习使用,如由牵扯版权问题请联系站长邮箱904561283@qq.com

添加评论