Document Title: =============== Barracuda CudaTel v2.0.029.1 - Multiple Vulnerabilities References (Source): ==================== http://www.vulnerability-lab.com/get_content.php?id=442 Release Date: ============= 2012-03-07 Vulnerability Laboratory ID (VL-ID): ==================================== 442 Common Vulnerability Scoring System: ==================================== 6.4 Product & Service Introduction: =============================== Designed to enable seamless voice and video communication, the CudaTel Communication Server is an easy-to-use, affordable, next-generation phone system for businesses. CudaTel Communication Server s enterprise-class feature set includes Voice over IP (VoIP) PBX services, conferencing, follow-me, automated attendant services, and more, controlled by an easy-to-use Web interface. CudaTel Communication Server is compatible with any SIP device and provider, and can be pre-configured for use with both analog and digital telephone networks. Powerful, Complete Solution With an expansive feature set and and no per user or phone licensing fees, the CudaTel Communication Server is equipped and priced for organizations of any size. Native High Definition audio support and integrated phone line (TDM) hardware produces an unparalleled audio experience. VOIP encryption protects calls from hackers and digital eavesdroppers. (Copy of the Vendor Homepage: http://www.barracudanetworks.ca/cudatel.aspx ) Abstract Advisory Information: ============================== Vulnerability Lab Team discovered multiple persistent Web Vulnerabilities on Barracudas CudaTel Phone Application v3.0.028.001. Vulnerability Disclosure Timeline: ================================== 2012-02-19: Vendor Notification 2012-02-00: Vendor Response/Feedback 2012-03-07: Vendor Fix/Patch by Check 2012-03-08: Public or Non-Public Disclosure Discovery Status: ================= Published Affected Product(s): ==================== Barracuda Networks Product: CudaTel - Communication Server 2.0.029.1 Exploitation Technique: ======================= Remote Severity Level: =============== Medium Technical Details & Description: ================================ Multiple persistent Input Validation vulnerabilities are detected on Barracudas CudaTel Phone Application v3.0.028.001. Local low privileged user accounts can implement/inject malicious script code to manipulate modules via persistent context requests. When exploited by an authenticated user, the identified vulnerabilities can result in information disclosure via error, session hijacking, access to available phone line services, manipulated persistent context execution out of the auto route listings. Vulnerable Module(s): [+] Automated Attendants [-] Advanced Routing extension - NAME & Listing [-] Auto Attendants - NAME & Listing [-] ALL Types Listing Category Picture(s): ../1.png ../2.png Proof of Concept (PoC): ======================= The vulnerabilities can be exploited by local privileged user accounts with low user inter action or remote via manipulated http request & high required user inter action. For demonstration or reproduce ... Code Review: Listing Category (All; Routing Extension; Auto Attendants) [EXECUTION OF PERSISTENT SCRIPT CODE]
">