On Barracuda CloudGen WAN Private Edge Gateway devices before 8 webui-sdwan-1089-8.3.1-174141891, an OS command injection vulnerability exists in /ajax/update_certificate - a crafted HTTP request allows an authenticated attacker to execute arbitrary commands. For example, a name field can contain :password and a password field can contain shell metacharacters.
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
Link | Tags |
---|---|
https://www.barracuda.com/products/network-security/cloudgen-wan | product |
http://seclists.org/fulldisclosure/2023/Mar/2 | mailing list third party advisory exploit |
https://sec-consult.com/vulnerability-lab/advisory/os-command-injection-in-barracuda-cloudgen-wan/ | third party advisory exploit |
https://campus.barracuda.com/product/cloudgenwan/doc/96024723/release-notes-8-3-1/ | release notes |