ID: CVE-2023-2868

Last Modified: June 1, 2023

A remote command injection vulnerability exists in the Barracuda Email Security Gateway (appliance form factor only) product effecting versions 5.1.3.001-9.2.0.006. The vulnerability arises out of a failure to comprehensively sanitize the processing of .tar file (tape archives). The vulnerability stems from incomplete input validation of a user-supplied .tar file as it pertains to the names of the files contained within the archive. As a consequence, a remote attacker can specifically format these file names in a particular manner that will result in remotely executing a system command through Perl's qx operator with the privileges of the Email Security Gateway product. This issue was fixed as part of BNSF-36456 patch. This patch was automatically applied to all customer appliances.

Twitter Activity

Tweets last week: 0

Remaining steady

Yahoo Activity

Yahoo results: 196000

Remaining steady

EPSS History

Current EPSS Score: 0.0244

Remaining steady


Reddit Activity

Reddit Posts: 28

Remaining steady

Github Repos

Github Repos: 4

Remaining steady

Exploits

Found exploits:

Attack Vector: Network

Attack Complexity: Low

Privileges Required: None

User Interaction: None

Scope: Unchanged

Confidentiality: High

Integrity: High

Availability: High

Base Score: 9.8

Exploitability Score: 3.9

Impact Score: 5.9

CVSS V3: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Specialize CVSS-Score

CWE-77

['alert file ( msg:"SERVER-WEBAPP Barracuda Email Security Gateway malicious .tar upload attempt"; flowbits:isset,file.tar; file_data; content:"ustar"; content:"L",within 1,distance -106; byte_extract:10,-32,hdr_size,relative,string,oct; content:"|60|",within hdr_size,distance 377; metadata:policy max-detect-ips drop,policy security-ips drop; reference:cve,2023-2868; reference:url,www.barracuda.com/company/legal/esg-vulnerability; classtype:web-application-attack; gid:1; sid:300596; rev:2; )\n', 'alert file ( msg:"SERVER-WEBAPP Barracuda Email Security Gateway malicious .tar upload attempt"; flowbits:isset,file.tar; file_data; content:"ustar"; content:"|60|",within 100,distance -262; metadata:policy max-detect-ips drop,policy security-ips drop; reference:cve,2023-2868; reference:url,www.barracuda.com/company/legal/esg-vulnerability; classtype:web-application-attack; gid:1; sid:300597; rev:2; )\n', 'alert file ( msg:"SERVER-WEBAPP Barracuda Email Security Gateway malicious .tar upload attempt"; flowbits:isset,file.tar; file_data; content:"ustar"; content:"L",within 1,distance -106; byte_extract:10,-32,hdr_size,relative,string,oct; content:"$(",within hdr_size,distance 377; metadata:policy max-detect-ips drop,policy security-ips drop; reference:cve,2023-2868; reference:url,www.barracuda.com/company/legal/esg-vulnerability; classtype:web-application-attack; gid:1; sid:300605; rev:1; )\n', 'alert file ( msg:"SERVER-WEBAPP Barracuda Email Security Gateway malicious .tar upload attempt"; flowbits:isset,file.tar; file_data; content:"ustar"; content:"$(",within 100,distance -262; metadata:policy max-detect-ips drop,policy security-ips drop; reference:cve,2023-2868; reference:url,www.barracuda.com/company/legal/esg-vulnerability; classtype:web-application-attack; gid:1; sid:300606; rev:1; )\n']

Condition Configuration
AND
OR
OR
Alle Schwachstellen für barracuda
OR
OR
Alle Schwachstellen für barracuda
Condition Configuration
AND
OR
OR
Alle Schwachstellen für barracuda
OR
OR
Alle Schwachstellen für barracuda
Condition Configuration
AND
OR
OR
Alle Schwachstellen für barracuda
OR
OR
Alle Schwachstellen für barracuda
Condition Configuration
AND
OR
OR
Alle Schwachstellen für barracuda
OR
OR
Alle Schwachstellen für barracuda
Condition Configuration
AND
OR
OR
Alle Schwachstellen für barracuda
OR
OR
Alle Schwachstellen für barracuda
Date: June 1, 2023

CWE-ID: Not defined
Base Score V3: Not defined
Exploitability Score V3: Not defined
Impact Score V3: Not defined
Cvss Vector V3: Not defined



                    <?xml version="1.0" ?>
<set operator="and">
    <set operator="or">
        <set operator="and">
            <set operator="or">
                <prop key="operating_system" value="cpe:2.3:o:barracuda:email_security_gateway_300_firmware:*:*:*:*:*:*:*:*"/>
            </set>
            <set operator="or">
                <prop key="device" value="cpe:2.3:h:barracuda:email_security_gateway_300:-:*:*:*:*:*:*:*"/>
            </set>
        </set>
        <set operator="and">
            <set operator="or">
                <prop key="operating_system" value="cpe:2.3:o:barracuda:email_security_gateway_400_firmware:*:*:*:*:*:*:*:*"/>
            </set>
            <set operator="or">
                <prop key="device" value="cpe:2.3:h:barracuda:email_security_gateway_400:-:*:*:*:*:*:*:*"/>
            </set>
        </set>
        <set operator="and">
            <set operator="or">
                <prop key="operating_system" value="cpe:2.3:o:barracuda:email_security_gateway_600_firmware:*:*:*:*:*:*:*:*"/>
            </set>
            <set operator="or">
                <prop key="device" value="cpe:2.3:h:barracuda:email_security_gateway_600:-:*:*:*:*:*:*:*"/>
            </set>
        </set>
        <set operator="and">
            <set operator="or">
                <prop key="operating_system" value="cpe:2.3:o:barracuda:email_security_gateway_800_firmware:*:*:*:*:*:*:*:*"/>
            </set>
            <set operator="or">
                <prop key="device" value="cpe:2.3:h:barracuda:email_security_gateway_800:-:*:*:*:*:*:*:*"/>
            </set>
        </set>
        <set operator="and">
            <set operator="or">
                <prop key="operating_system" value="cpe:2.3:o:barracuda:email_security_gateway_900_firmware:*:*:*:*:*:*:*:*"/>
            </set>
            <set operator="or">
                <prop key="device" value="cpe:2.3:h:barracuda:email_security_gateway_900:-:*:*:*:*:*:*:*"/>
            </set>
        </set>
    </set>
</set>

                  
                      <?xml version="1.0" ?>
<set operator="and">
    <set operator="or">
        <set operator="and">
            <set operator="or">
                <prop key="operating_system" value="cpe:2.3:o:barracuda:email_security_gateway_300_firmware:*:*:*:*:*:*:*:*"/>
            </set>
            <set operator="or">
                <prop key="device" value="cpe:2.3:h:barracuda:email_security_gateway_300:-:*:*:*:*:*:*:*"/>
            </set>
        </set>
        <set operator="and">
            <set operator="or">
                <prop key="operating_system" value="cpe:2.3:o:barracuda:email_security_gateway_400_firmware:*:*:*:*:*:*:*:*"/>
            </set>
            <set operator="or">
                <prop key="device" value="cpe:2.3:h:barracuda:email_security_gateway_400:-:*:*:*:*:*:*:*"/>
            </set>
        </set>
        <set operator="and">
            <set operator="or">
                <prop key="operating_system" value="cpe:2.3:o:barracuda:email_security_gateway_600_firmware:*:*:*:*:*:*:*:*"/>
            </set>
            <set operator="or">
                <prop key="device" value="cpe:2.3:h:barracuda:email_security_gateway_600:-:*:*:*:*:*:*:*"/>
            </set>
        </set>
        <set operator="and">
            <set operator="or">
                <prop key="operating_system" value="cpe:2.3:o:barracuda:email_security_gateway_800_firmware:*:*:*:*:*:*:*:*"/>
            </set>
            <set operator="or">
                <prop key="device" value="cpe:2.3:h:barracuda:email_security_gateway_800:-:*:*:*:*:*:*:*"/>
            </set>
        </set>
        <set operator="and">
            <set operator="or">
                <prop key="operating_system" value="cpe:2.3:o:barracuda:email_security_gateway_900_firmware:*:*:*:*:*:*:*:*"/>
            </set>
            <set operator="or">
                <prop key="device" value="cpe:2.3:h:barracuda:email_security_gateway_900:-:*:*:*:*:*:*:*"/>
            </set>
        </set>
    </set>
    <prop key="program_influence" value="input"/>
</set>