Document Title: =============== Barracuda CudaTel 2.6.02.04 - Multiple Web Vulnerabilities Date: ===== 2013-06-24 References: =========== http://vulnerability-lab.com/get_content.php?id=778 BARRACUDA NETWORK SECURITY ID: BNSEC-811 VL-ID: ===== 778 Common Vulnerability Scoring System: ==================================== 2.5 Introduction: ============= Designed to enable seamless voice and video communication, the CudaTel Communication Server is an easy-to-use, affordable, next-generation phone system for businesses. CudaTel Communication Server s enterprise-class feature set includes Voice over IP (VoIP) PBX services, conferencing, follow-me, automated attendant services, and more, controlled by an easy-to-use Web interface. CudaTel Communication Server is compatible with any SIP device and provider, and can be pre-configured for use with both analog and digital telephone networks. Powerful, Complete Solution With an expansive feature set and and no per user or phone licensing fees, the CudaTel Communication Server is equipped and priced for organizations of any size. Native High Definition audio support and integrated phone line (TDM) hardware produces an unparalleled audio experience. VOIP encryption protects calls from hackers and digital eavesdroppers. (Copy of the Vendor Homepage: http://www.barracudanetworks.ca/cudatel.aspx ) Abstract: ========= The Vulnerability Laboratory Research Team discovered multiple client side vulnerabilities in the Barracuda Networks CudaTel v2.6.002.040 appliance application. Report-Timeline: ================ 2012-11-27: Researcher Notification & Coordination (Benjamin Kunz Mejri) 2012-11-28: Vendor Notification (Barracuda Networks Security - Bug Bounty Program) 2012-12-01: Vendor Response/Feedback (Barracuda Networks Security - Bug Bounty Program) 2013-03-14: Vendor Fix/Patch (Barracuda Networks Developer) [Coordination: Dave Farrow] 2012-06-25: Public Disclosure (Vulnerability Laboratory) Status: ======== Published Affected Products: ================== Barracuda Networks Product: CudaTel - Communication Server v2.6.002.040 Exploitation-Technique: ======================= Remote Severity: ========= Medium Details: ======== Multiple client side input validation vulnerabilities are detected in the Barracuda Networks CudaTel v2.6.002.040 appliance application. The non-persistent vulnerabilities allows an attacker (remote) to manipulate client side application to browser requests. The vulnerability (client side) is located in the siplist and list module when processing to request manipulated bbx_provider_gateway_name, bbx_provider_gateway_username or bbx_provider_gateway_host parameter listing. Exploitation of the vulnerability requires medium application user interaction. Successful exploitation of the vulnerability results in client side phishing, client side session hijacking, client side external redirects to malware or evil websites and client side module context manipulation(cache). Vulnerable Module(s): [+] siplist - Listing [+] list - Listing Vulnerable Parameter(s): [+] bbx_provider_gateway_name [+] bbx_provider_gateway_username [+] bbx_provider_gateway_host Proof of Concept: ================= The client side input validation vulnerabilities can be exploited by remote attackers without required application user account and with medium or high required user interaction. For demonstration or reproduce ... Path: gui/gateway/siplist gui/gateway/list Parameter: undefined, bbx_provider, rows, page & searchstring Values: bbx_provider_gateway_name, bbx_provider_gateway_username & bbx_provider_gateway_host Review: List
--- count: 1 list: - bbx_domain_id: 6 bbx_extension_block_begin: 2008 bbx_extension_block_end: 2008 bbx_extension_id: 26 bbx_extension_id_primary: 26 bbx_extension_rcd: 2012-11-26 15:58:45.413912 bbx_extension_rpd: 2012-11-26 15:58:45.413912 bbx_extension_value: 2008 bbx_queue_id: 12 flag_auto_provision: 0 flag_external: 0 flag_locked: 0 flag_primary: 1 flag_standalone: 1 flag_super: 0 flag_voicemail: 0 show_name: "\"><[PERSISTENT INJECTED SCRIPT CODE!]>" sort_name: "\"><[PERSISTENT INJECTED SCRIPT CODE!]>" type: queue page: 1 rows: 25Review: SipList
--- count: 4 page: 1 rows: 30 siplist: - bbx_provider_gateway_flag_inbound: 1 bbx_provider_gateway_flag_outbound: 1 bbx_provider_gateway_host: "\">/\"/'\"<[PERSISTENT INJECTED SCRIPT CODE!]>" bbx_provider_gateway_id: 22 bbx_provider_gateway_name: "\"><[PERSISTENT INJECTED SCRIPT CODE!]>" bbx_provider_gateway_port: 5060 bbx_provider_gateway_state: REFRESH bbx_provider_gateway_username: "\">/\"/'\"<[PERSISTENT INJECTED SCRIPT CODE!]>" bbx_provider_name: Generic SIP - bbx_provider_gateway_flag_inbound: 1 bbx_provider_gateway_flag_outbound: 1 bbx_provider_gateway_host: <[PERSISTENT INJECTED SCRIPT CODE!]")< bbx_provider_gateway_id:="" 23="" bbx_provider_gateway_name:="" <[PERSISTENT INJECTED SCRIPT CODE!];)" <=""