First published: Fri May 23 2008(Updated: )
Cross-site scripting (XSS) vulnerability in ldap_test.cgi in Barracuda Spam Firewall (BSF) before 3.5.11.025 allows remote attackers to inject arbitrary web script or HTML via the email parameter.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Barracuda Spam Firewall | =3.4.10.102 | |
Barracuda Spam Firewall | =3.3.01.001 | |
Barracuda Spam Firewall | =3.3.15.026 | |
Barracuda Spam Firewall | =3.1.18 | |
Barracuda Spam Firewall | =3.3.0.54 | |
Barracuda Spam Firewall | =3.4 | |
Barracuda Spam Firewall | =3.1.16 | |
Barracuda Spam Firewall | =3.3.03.055 | |
Barracuda Spam Firewall | <=3.5.11.020 | |
Barracuda Spam Firewall | =3.3.03.053 | |
Barracuda Spam Firewall | =3.1.17 | |
Barracuda Spam Firewall | =3.3.3 | |
Barracuda Spam Firewall | =3.1.10 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2008-2333 is classified as a medium-risk cross-site scripting vulnerability.
To fix CVE-2008-2333, you should upgrade to Barracuda Spam Firewall version 3.5.11.025 or later.
Versions of Barracuda Spam Firewall prior to 3.5.11.025, including 3.1.x, 3.3.x, and 3.4.x, are affected by CVE-2008-2333.
CVE-2008-2333 is vulnerable to cross-site scripting (XSS) attacks, allowing remote attackers to inject arbitrary web scripts or HTML.
The email parameter in CVE-2008-2333 is a vulnerable input field in ldap_test.cgi that can be exploited for XSS.