CVE | CVE-2023-26213 |
CVE Title | |
Published Date | 2023-03-03T22:15Z |
Modified Date | 2023-03-10T14:53Z |
CWE Type | CWE-78 |
CVSS 3.x | CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H |
Description | On Barracuda CloudGen WAN Private Edge Gateway devices before 8 webui-sdwan-1089-8.3.1-174141891, an OS command injection vulnerability exists in /ajax/update_certificate - a crafted HTTP request allows an authenticated attacker to execute arbitrary commands. For example, a name field can contain :password and a password field can contain shell metacharacters. |
References | |
By clicking these links you will leave this website. We do not endorse and will not be held accountable for any activity on external sites. | |
Reference URL | http://seclists.org/fulldisclosure/2023/Mar/2 |
Reference Description | FULLDISC 20230302 SEC Consult SA-20230228-0 :: OS Command Injectionin Barracuda CloudGen WAN |
Reference URL | https://sec-consult.com/vulnerability-lab/advisory/os-command-injection-in-barracuda-cloudgen-wan/ |
Reference Description | MISC https://sec-consult.com/vulnerability-lab/advisory/os-command-injection-in-barracuda-cloudgen-wan/ |
Reference URL | https://campus.barracuda.com/product/cloudgenwan/doc/96024723/release-notes-8-3-1/ |
Reference Description | CONFIRM https://campus.barracuda.com/product/cloudgenwan/doc/96024723/release-notes-8-3-1/ |
Reference URL | https://www.barracuda.com/products/network-security/cloudgen-wan |
Reference Description | MISC https://www.barracuda.com/products/network-security/cloudgen-wan |
Tags | Exploit Mailing List Third Party Advisory |
Sources | NIST MITRE |