First published: Fri Dec 19 2008(Updated: )
Multiple cross-site scripting (XSS) vulnerabilities in index.cgi in Barracuda Spam Firewall (BSF) before 3.5.12.007, Message Archiver before 1.2.1.002, Web Filter before 3.3.0.052, IM Firewall before 3.1.01.017, and Load Balancer before 2.3.024 allow remote attackers to inject arbitrary web script or HTML via (1) the Policy Name field in Search Based Retention Policy in Message Archiver; unspecified parameters in the (2) IP Configuration, (3) Administration, (4) Journal Accounts, (5) Retention Policy, and (6) GroupWise Sync components in Message Archiver; (7) input to search operations in Web Filter; and (8) input used in error messages and (9) hidden INPUT elements in (a) Spam Firewall, (b) IM Firewall, and (c) Web Filter.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Barracuda IM Firewall | <=3.0.01.008 | |
Barracuda Load Balancer | <=2.2.006 | |
Barracuda Message Archiver | <=1.1.0.010 | |
Barracuda Spam Firewall | <=3.5.11.020 | |
Bloxx Web Filtering | <=3.3.0.038 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2008-0971 is classified as a high severity vulnerability due to its potential for remote code execution via cross-site scripting.
To fix CVE-2008-0971, update your Barracuda Spam Firewall, Web Filter, Load Balancer, Message Archiver, or IM Firewall to the latest patched version.
CVE-2008-0971 affects Barracuda Spam Firewall versions prior to 3.5.12.007, Message Archiver versions prior to 1.2.1.002, Web Filter versions prior to 3.3.0.052, IM Firewall versions prior to 3.1.01.017, and Load Balancer versions prior to 2.3.024.
CVE-2008-0971 can enable remote attackers to inject arbitrary web scripts, potentially leading to data theft or session hijacking.
As a temporary workaround for CVE-2008-0971, consider implementing additional input validation on user-generated content to mitigate XSS attacks until a full update can be applied.