Lucene search

K
nvd[email protected]NVD:CVE-2023-2868
HistoryMay 24, 2023 - 7:15 p.m.

CVE-2023-2868

2023-05-2419:15:09
CWE-20
CWE-77
web.nvd.nist.gov
2
remote command injection
barracuda email security gateway
appliance
vulnerability
input validation
.tar file
remote attackers
system commands
perl
bnsf-36456 patch
customer appliances

9.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

9.8 High

AI Score

Confidence

High

0.075 Low

EPSS

Percentile

94.1%

A remote command injection vulnerability exists in the Barracuda Email Security Gateway (appliance form factor only) product effecting versions 5.1.3.001-9.2.0.006. The vulnerability arises out of a failure to comprehensively sanitize the processing of .tar file (tape archives).Β The vulnerability stems from incomplete input validation of a user-supplied .tar file as it pertains to the names of the files contained within the archive. As a consequence, a remote attacker can specifically format these file names in a particular manner that will result in remotely executing a system command through Perl’s qx operator with the privileges of the Email Security Gateway product.Β This issue was fixed as part of BNSF-36456 patch. This patch was automatically applied to all customer appliances.

Affected configurations

NVD
Node
barracudaemail_security_gateway_300_firmwareRange5.1.3.001–9.2.0.006
AND
barracudaemail_security_gateway_300Match-
Node
barracudaemail_security_gateway_400_firmwareRange5.1.3.001–9.2.0.006
AND
barracudaemail_security_gateway_400Match-
Node
barracudaemail_security_gateway_600_firmwareRange5.1.3.001–9.2.0.006
AND
barracudaemail_security_gateway_600Match-
Node
barracudaemail_security_gateway_800_firmwareRange5.1.3.001–9.2.0.006
AND
barracudaemail_security_gateway_800Match-
Node
barracudaemail_security_gateway_900_firmwareRange5.1.3.001–9.2.0.006
AND
barracudaemail_security_gateway_900Match-

9.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

9.8 High

AI Score

Confidence

High

0.075 Low

EPSS

Percentile

94.1%