Barracuda Spam Firewall User Interface Multiple Field XSS

2005-11-16T09:17:30
ID OSVDB:20878
Type osvdb
Reporter security curmudgeon(jericho@attrition.org)
Modified 2005-11-16T09:17:30

Description

Vulnerability Description

Barracuda Spam Firewall contains a flaw that allows a remote cross site scripting attack. This flaw exists because the application does not validate 'Email Address' field on the Whitelist/Blacklist page, or the 'Notification Address' field on the Quarantine Settings page upon submission to the user interface. This could allow a user to create a specially crafted URL that would execute arbitrary code in a user's browser within the trust relationship between the browser and the server, leading to a loss of integrity.

The Barracuda interface does not store cookies, so this attack can not be used to obtain such information.

Solution Description

Currently, there are no known upgrades, patches, or workarounds available to correct this issue.

Short Description

Barracuda Spam Firewall contains a flaw that allows a remote cross site scripting attack. This flaw exists because the application does not validate 'Email Address' field on the Whitelist/Blacklist page, or the 'Notification Address' field on the Quarantine Settings page upon submission to the user interface. This could allow a user to create a specially crafted URL that would execute arbitrary code in a user's browser within the trust relationship between the browser and the server, leading to a loss of integrity.

The Barracuda interface does not store cookies, so this attack can not be used to obtain such information.

References:

Vendor URL: http://www.barracudanetworks.com/ Related OSVDB ID: 20879 Other Advisory URL: http://osvdb.org/ref/20/20878-barracuda.txt