Exploited
CWE
77 20 119 22
Advisory Published
Updated

CVE-2023-2868: Barracuda Networks ESG Appliance Improper Input Validation Vulnerability

First published: Wed May 24 2023(Updated: )

A remote command injection vulnerability exists in the Barracuda Email Security Gateway (appliance form factor only) product effecting versions 5.1.3.001-9.2.0.006. The vulnerability arises out of a failure to comprehensively sanitize the processing of .tar file (tape archives). The vulnerability stems from incomplete input validation of a user-supplied .tar file as it pertains to the names of the files contained within the archive. As a consequence, a remote attacker can specifically format these file names in a particular manner that will result in remotely executing a system command through Perl's qx operator with the privileges of the Email Security Gateway product. This issue was fixed as part of BNSF-36456 patch. This patch was automatically applied to all customer appliances.

Credit: cve-coordination@google.com cve-coordination@google.com

Affected SoftwareAffected VersionHow to fix
Barracuda Email Security Gateway 300 Firmware>=5.1.3.001<=9.2.0.006
Barracuda Email Security Gateway 300
Barracuda Email Security Gateway 400 Firmware>=5.1.3.001<=9.2.0.006
Barracuda Email Security Gateway 400
Barracuda Email Security Gateway 600 Firmware>=5.1.3.001<=9.2.0.006
Barracuda Email Security Gateway 600
Barracuda Email Security Gateway 800 Firmware>=5.1.3.001<=9.2.0.006
Barracuda Email Security Gateway 800
Barracuda Email Security Gateway 900 Firmware>=5.1.3.001<=9.2.0.006
Barracuda Email Security Gateway 900
Barracuda Networks Email Security Gateway (ESG) Appliance
All of
Barracuda Email Security Gateway 300 Firmware>=5.1.3.001<=9.2.0.006
Barracuda Email Security Gateway 300
All of
Barracuda Email Security Gateway 400 Firmware>=5.1.3.001<=9.2.0.006
Barracuda Email Security Gateway 400
All of
Barracuda Email Security Gateway 600 Firmware>=5.1.3.001<=9.2.0.006
Barracuda Email Security Gateway 600
All of
Barracuda Email Security Gateway 800 Firmware>=5.1.3.001<=9.2.0.006
Barracuda Email Security Gateway 800
All of
Barracuda Email Security Gateway 900 Firmware>=5.1.3.001<=9.2.0.006
Barracuda Email Security Gateway 900

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Peer vulnerabilities

(Found alongside the following vulnerabilities)

Frequently Asked Questions

  • What is CVE-2023-2868?

    CVE-2023-2868 is a vulnerability that allows remote command injection in the Barracuda Email Security Gateway (appliance form factor only) product.

  • What is the severity of CVE-2023-2868?

    The severity of CVE-2023-2868 is critical with a severity value of 9.8.

  • Which software versions are affected by CVE-2023-2868?

    Versions 5.1.3.001-9.2.0.006 of the Barracuda Email Security Gateway (appliance form factor only) product are affected by CVE-2023-2868.

  • How can the vulnerability be exploited?

    The vulnerability can be exploited by injecting remote commands via a .tar file.

  • How can I fix CVE-2023-2868?

    To fix CVE-2023-2868, update the Barracuda Email Security Gateway (appliance form factor only) product to a version higher than 9.2.0.006.

Contact

SecAlerts Pty Ltd.
132 Wickham Terrace
Fortitude Valley,
QLD 4006, Australia
info@secalerts.co
By using SecAlerts services, you agree to our services end-user license agreement. This website is safeguarded by reCAPTCHA and governed by the Google Privacy Policy and Terms of Service. All names, logos, and brands of products are owned by their respective owners, and any usage of these names, logos, and brands for identification purposes only does not imply endorsement. If you possess any content that requires removal, please get in touch with us.
© 2024 SecAlerts Pty Ltd.
ABN: 70 645 966 203, ACN: 645 966 203