ID

VAR-200805-0007


CVE

CVE-2008-2333


TITLE

Barracuda Spam Firewall of ldap_test.cgi Vulnerable to cross-site scripting

Trust: 0.8

sources: JVNDB: JVNDB-2008-002510

DESCRIPTION

Cross-site scripting (XSS) vulnerability in ldap_test.cgi in Barracuda Spam Firewall (BSF) before 3.5.11.025 allows remote attackers to inject arbitrary web script or HTML via the email parameter. An attacker may leverage this issue to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This may help the attacker steal cookie-based authentication credentials and launch other attacks. Firmware prior to Barracuda Spam Firewall 3.5.11.025 is vulnerable. The Barracuda device provides the LDAP test function through the ldap_test.cgi script. ---------------------------------------------------------------------- Secunia Network Software Inspector 2.0 (NSI) - Public Beta The Public Beta has ended. Thanks to all that participated. Input passed to the "email" parameter in cgi-bin/ldap_test.cgi is not properly sanitised before being returned to a user. Other versions may also be affected. SOLUTION: Update to firmware version 3.5.11.025 (2008-05-16). PROVIDED AND/OR DISCOVERED BY: Mark Crowther, Information Risk Management Plc. ORIGINAL ADVISORY: Barracuda Networks: http://www.barracudanetworks.com/ns/support/tech_alert.php Information Risk Management Plc.: http://www.irmplc.com/index.php/168-Advisory-027 ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------

Trust: 2.07

sources: NVD: CVE-2008-2333 // JVNDB: JVNDB-2008-002510 // BID: 29340 // VULHUB: VHN-32458 // PACKETSTORM: 66657

AFFECTED PRODUCTS

vendor:barracudamodel:spam firewallscope:eqversion:3.3.3

Trust: 1.6

vendor:barracudamodel:spam firewallscope:eqversion:3.4.10.102

Trust: 1.6

vendor:barracudamodel:spam firewallscope:eqversion:3.3.03.055

Trust: 1.6

vendor:barracudamodel:spam firewallscope:eqversion:3.1.10

Trust: 1.6

vendor:barracudamodel:spam firewallscope:eqversion:3.3.15.026

Trust: 1.6

vendor:barracudamodel:spam firewallscope:eqversion:3.1.18

Trust: 1.6

vendor:barracudamodel:spam firewallscope:eqversion:3.4

Trust: 1.6

vendor:barracudamodel:spam firewallscope:eqversion:3.3.01.001

Trust: 1.6

vendor:barracudamodel:spam firewallscope:eqversion:3.3.03.053

Trust: 1.6

vendor:barracudamodel:spam firewallscope:eqversion:3.1.16

Trust: 1.0

vendor:barracudamodel:spam firewallscope:lteversion:3.5.11.020

Trust: 1.0

vendor:barracudamodel:spam firewallscope:eqversion:3.1.17

Trust: 1.0

vendor:barracudamodel:spam firewallscope:eqversion:3.3.0.54

Trust: 1.0

vendor:barracudamodel:spam firewallscope:ltversion:3.5.11.025

Trust: 0.8

vendor:barracudamodel:spam firewallscope:eqversion:3.5.11.020

Trust: 0.6

vendor:barracudamodel:networks barracuda spam firewallscope:eqversion:3.5.11.020

Trust: 0.3

vendor:barracudamodel:networks barracuda spam firewallscope:eqversion:3.3.15026

Trust: 0.3

vendor:barracudamodel:networks barracuda spam firewallscope:eqversion:3.1.18

Trust: 0.3

vendor:barracudamodel:networks barracuda spam firewallscope:eqversion:3.1.17

Trust: 0.3

vendor:barracudamodel:networks barracuda spam firewallscope:eqversion:3.3.03.055

Trust: 0.3

vendor:barracudamodel:networks barracuda spam firewallscope:eqversion:3.3.03.053

Trust: 0.3

vendor:barracudamodel:networks barracuda spam firewallscope:eqversion:3.3.03.022

Trust: 0.3

vendor:barracudamodel:networks barracuda spam firewallscope:eqversion:3.3.01.001

Trust: 0.3

vendor:barracudamodel:networks barracuda spam firewallscope:eqversion:3.3.0.54

Trust: 0.3

vendor:barracudamodel:networks barracuda spam firewallscope:neversion:3.5.11.025

Trust: 0.3

sources: BID: 29340 // JVNDB: JVNDB-2008-002510 // CNNVD: CNNVD-200805-311 // NVD: CVE-2008-2333

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2008-2333
value: MEDIUM

Trust: 1.0

NVD: CVE-2008-2333
value: MEDIUM

Trust: 0.8

CNNVD: CNNVD-200805-311
value: MEDIUM

Trust: 0.6

VULHUB: VHN-32458
value: MEDIUM

Trust: 0.1

nvd@nist.gov: CVE-2008-2333
severity: MEDIUM
baseScore: 4.3
vectorString: AV:N/AC:M/AU:N/C:N/I:P/A:N
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: NONE
integrityImpact: PARTIAL
availabilityImpact: NONE
exploitabilityScore: 8.6
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

VULHUB: VHN-32458
severity: MEDIUM
baseScore: 4.3
vectorString: AV:N/AC:M/AU:N/C:N/I:P/A:N
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: NONE
integrityImpact: PARTIAL
availabilityImpact: NONE
exploitabilityScore: 8.6
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

sources: VULHUB: VHN-32458 // JVNDB: JVNDB-2008-002510 // CNNVD: CNNVD-200805-311 // NVD: CVE-2008-2333

PROBLEMTYPE DATA

problemtype:CWE-79

Trust: 1.9

sources: VULHUB: VHN-32458 // JVNDB: JVNDB-2008-002510 // NVD: CVE-2008-2333

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-200805-311

TYPE

xss

Trust: 0.7

sources: PACKETSTORM: 66657 // CNNVD: CNNVD-200805-311

CONFIGURATIONS

sources: JVNDB: JVNDB-2008-002510

EXPLOIT AVAILABILITY

sources: VULHUB: VHN-32458

PATCH

title:Barracuda Spam Firewall resolved vulnerability associated with LDAP test scripturl:http://www.barracudanetworks.com/ns/support/tech_alert.php

Trust: 0.8

sources: JVNDB: JVNDB-2008-002510

EXTERNAL IDS

db:BIDid:29340

Trust: 2.8

db:NVDid:CVE-2008-2333

Trust: 2.8

db:SECUNIAid:30362

Trust: 2.6

db:SECTRACKid:1020108

Trust: 2.5

db:VUPENid:ADV-2008-1627

Trust: 1.7

db:XFid:42594

Trust: 1.4

db:JVNDBid:JVNDB-2008-002510

Trust: 0.8

db:CNNVDid:CNNVD-200805-311

Trust: 0.7

db:BUGTRAQid:20080522 IRM SECURITY ADVISORY : BARRACUDA NETWORKS SPAM FIREWALL CROSS-SITE SCRIPTING VULNERABILITY

Trust: 0.6

db:EXPLOIT-DBid:31828

Trust: 0.1

db:PACKETSTORMid:66610

Trust: 0.1

db:SEEBUGid:SSVID-85143

Trust: 0.1

db:VULHUBid:VHN-32458

Trust: 0.1

db:PACKETSTORMid:66657

Trust: 0.1

sources: VULHUB: VHN-32458 // BID: 29340 // JVNDB: JVNDB-2008-002510 // PACKETSTORM: 66657 // CNNVD: CNNVD-200805-311 // NVD: CVE-2008-2333

REFERENCES

url:http://www.securityfocus.com/bid/29340

Trust: 2.5

url:http://www.securitytracker.com/id?1020108

Trust: 2.5

url:http://secunia.com/advisories/30362

Trust: 2.5

url:http://www.barracudanetworks.com/ns/support/tech_alert.php

Trust: 2.1

url:http://www.irmplc.com/index.php/168-advisory-027

Trust: 1.8

url:http://www.vupen.com/english/advisories/2008/1627/references

Trust: 1.7

url:http://xforce.iss.net/xforce/xfdb/42594

Trust: 1.4

url:http://www.securityfocus.com/archive/1/492475/100/0/threaded

Trust: 1.1

url:https://exchange.xforce.ibmcloud.com/vulnerabilities/42594

Trust: 1.1

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2008-2333

Trust: 0.8

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2008-2333

Trust: 0.8

url:http://www.securityfocus.com/archive/1/archive/1/492475/100/0/threaded

Trust: 0.6

url:http://www.barracudanetworks.com/ns/products/spam_overview.php

Trust: 0.3

url:/archive/1/492475

Trust: 0.3

url:http://secunia.com/secunia_security_advisories/

Trust: 0.1

url:http://secunia.com/network_software_inspector_2/

Trust: 0.1

url:http://secunia.com/product/4639/

Trust: 0.1

url:http://secunia.com/advisories/30362/

Trust: 0.1

url:http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org

Trust: 0.1

url:http://secunia.com/about_secunia_advisories/

Trust: 0.1

sources: VULHUB: VHN-32458 // BID: 29340 // JVNDB: JVNDB-2008-002510 // PACKETSTORM: 66657 // CNNVD: CNNVD-200805-311 // NVD: CVE-2008-2333

CREDITS

Mark Crowther mark.crowther@irmplc.com

Trust: 0.6

sources: CNNVD: CNNVD-200805-311

SOURCES

db:VULHUBid:VHN-32458
db:BIDid:29340
db:JVNDBid:JVNDB-2008-002510
db:PACKETSTORMid:66657
db:CNNVDid:CNNVD-200805-311
db:NVDid:CVE-2008-2333

LAST UPDATE DATE

2025-04-10T23:05:25.451000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-32458date:2018-10-11T00:00:00
db:BIDid:29340date:2015-03-19T09:42:00
db:JVNDBid:JVNDB-2008-002510date:2011-06-06T00:00:00
db:CNNVDid:CNNVD-200805-311date:2009-03-13T00:00:00
db:NVDid:CVE-2008-2333date:2025-04-09T00:30:58.490

SOURCES RELEASE DATE

db:VULHUBid:VHN-32458date:2008-05-23T00:00:00
db:BIDid:29340date:2008-05-22T00:00:00
db:JVNDBid:JVNDB-2008-002510date:2011-06-06T00:00:00
db:PACKETSTORMid:66657date:2008-05-27T20:29:09
db:CNNVDid:CNNVD-200805-311date:2008-05-23T00:00:00
db:NVDid:CVE-2008-2333date:2008-05-23T15:32:00