Remote Code injection in Barracuda Email Security Gateway(CVE-2023-2868)
CVE编号
CVE-2023-2868利用情况
暂无补丁情况
N/A披露时间
2023-05-25漏洞描述
A remote command injection vulnerability exists in the Barracuda Email Security Gateway (appliance form factor only) product effecting versions 5.1.3.001-9.2.0.006. The vulnerability arises out of a failure to comprehensively sanitize the processing of .tar file (tape archives). The vulnerability stems from incomplete input validation of a user-supplied .tar file as it pertains to the names of the files contained within the archive. As a consequence, a remote attacker can specifically format these file names in a particular manner that will result in remotely executing a system command through Perl's qx operator with the privileges of the Email Security Gateway product. This issue was fixed as part of BNSF-36456 patch. This patch was automatically applied to all customer appliances.解决建议
建议您更新当前系统或软件至最新版,完成漏洞的修复。
参考链接 |
|
---|---|
https://status.barracuda.com/incidents/34kx82j5n4q9 | |
https://www.barracuda.com/company/legal/esg-vulnerability |
受影响软件情况
# | 类型 | 厂商 | 产品 | 版本 | 影响面 | ||||
1 | |||||||||
---|---|---|---|---|---|---|---|---|---|
运行在以下环境 | |||||||||
系统 | barracuda | email_security_gateway_300_firmware | * | From (including) 5.1.3.001 | Up to (including) 9.2.0.006 | ||||
运行在以下环境 | |||||||||
系统 | barracuda | email_security_gateway_400_firmware | * | From (including) 5.1.3.001 | Up to (including) 9.2.0.006 | ||||
运行在以下环境 | |||||||||
系统 | barracuda | email_security_gateway_600_firmware | * | From (including) 5.1.3.001 | Up to (including) 9.2.0.006 | ||||
运行在以下环境 | |||||||||
系统 | barracuda | email_security_gateway_800_firmware | * | From (including) 5.1.3.001 | Up to (including) 9.2.0.006 | ||||
运行在以下环境 | |||||||||
系统 | barracuda | email_security_gateway_900_firmware | * | From (including) 5.1.3.001 | Up to (including) 9.2.0.006 | ||||
运行在以下环境 | |||||||||
系统 | fedora_36 | dino-devel | * | Up to (excluding) 0.3.2-1.fc36 | |||||
运行在以下环境 | |||||||||
系统 | fedora_37 | dino-devel | * | Up to (excluding) 0.3.2-1.fc37 | |||||
运行在以下环境 | |||||||||
系统 | fedora_38 | dino-devel | * | Up to (excluding) 0.4.2-1.fc38 | |||||
运行在以下环境 | |||||||||
硬件 | barracuda | email_security_gateway_300 | - | - | |||||
运行在以下环境 | |||||||||
硬件 | barracuda | email_security_gateway_400 | - | - | |||||
运行在以下环境 | |||||||||
硬件 | barracuda | email_security_gateway_600 | - | - | |||||
运行在以下环境 | |||||||||
硬件 | barracuda | email_security_gateway_800 | - | - | |||||
运行在以下环境 | |||||||||
硬件 | barracuda | email_security_gateway_900 | - | - | |||||
- 攻击路径 网络
- 攻击复杂度 低
- 权限要求 无
- 影响范围 未更改
- 用户交互 无
- 可用性 高
- 保密性 高
- 完整性 高
CWE-ID | 漏洞类型 |
CWE-77 | 在命令中使用的特殊元素转义处理不恰当(命令注入) |
Exp相关链接

版权声明
本站原创文章转载请注明文章出处及链接,谢谢合作!
评论