First published: Sat Aug 05 2006(Updated: )
Directory traversal vulnerability in cgi-bin/preview_email.cgi in Barracuda Spam Firewall (BSF) 3.3.01.001 through 3.3.03.053 allows remote authenticated users to read arbitrary files via a .. (dot dot) in the file parameter.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Barracuda Spam Firewall | =3.3.01.001 | |
Barracuda Spam Firewall | =3.3.03.053 | |
Barracuda Spam Firewall | =3.3.03.055 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2006-4000 is classified as a medium severity vulnerability due to its potential to allow unauthorized access to sensitive files.
CVE-2006-4000 exploits directory traversal by allowing attackers to use '..' in the file parameter to read arbitrary files on the server.
CVE-2006-4000 affects Barracuda Spam Firewall versions 3.3.01.001, 3.3.03.053, and 3.3.03.055.
To fix CVE-2006-4000, update to the latest version of Barracuda Spam Firewall that addresses this vulnerability.
CVE-2006-4000 can be exploited by remote authenticated users who can manipulate the file parameter of the vulnerable CGI script.