PT-2023-2960 · Barracuda · Barracuda Email Security Gateway Appliance
Published
2023-05-24
·
Updated
2025-04-02
·
CVE-2023-2868
10
Critical
Base vector | Vector | AV:N/AC:L/Au:N/C:C/I:C/A:C |
Name of the Vulnerable Software and Affected Versions:
Barracuda Email Security Gateway versions 5.1.3.001 through 9.2.0.006
Description:
A remote command injection vulnerability exists in the Barracuda Email Security Gateway product, affecting versions 5.1.3.001 through 9.2.0.006. The vulnerability arises from a failure to comprehensively sanitize the processing of .tar files, specifically due to incomplete input validation of user-supplied .tar files as it pertains to the names of the files contained within the archive. This allows a remote attacker to format file names in a particular manner, resulting in the remote execution of a system command through Perl's qx operator with the privileges of the Email Security Gateway product. The issue was fixed as part of the BNSF-36456 patch, which was automatically applied to all customer appliances. The vulnerability has been exploited by suspected Chinese hackers, and the FBI has warned that patches for the vulnerability are ineffective. The FBI recommends immediately replacing compromised appliances.
Recommendations:
As a temporary workaround, consider disabling the `bsmtpd` daemon until a patch is available. Restrict access to the vulnerable module `Barracuda Email Security Gateway` to minimize the risk of exploitation. Avoid using the `qx` operator in Perl scripts that handle user-supplied input until the issue is resolved. Immediately replace compromised Barracuda Email Security Gateway appliances, as patches are ineffective against this vulnerability.
Exploit
Fix
RCE
Command Injection
Related Identifiers
Affected Products
References · 125
- 🔥 https://github.com/cfielding-r7/poc-cve-2023-2868⭐ 10 🔗 6 · Exploit
- https://bdu.fstec.ru/vul/2023-02969 · Security Note
- https://status.barracuda.com/incidents/34kx82j5n4q9 · Security Note, Vendor Advisory
- https://barracuda.com/company/legal/esg-vulnerability · Vendor Advisory
- https://nvd.nist.gov/vuln/detail/CVE-2023-2868 · Security Note
- https://t.me/pentestingnews/36696 · Telegram Post
- https://twitter.com/Cyber_O51NT/status/1696542094524113313 · Twitter Post
- https://t.me/aptreports/5326 · Telegram Post
- https://t.me/defcon_news/114133 · Telegram Post
- https://twitter.com/CVEShield/status/1690632164172316672 · Twitter Post
- https://twitter.com/MasafumiNegishi/status/1696722016827785487 · Twitter Post
- https://twitter.com/Syynya/status/1689095384306745344 · Twitter Post
- https://t.me/sysadm_in_channel/4810 · Telegram Post
- https://twitter.com/TeamT5_Official/status/1691978151050842333 · Twitter Post
- https://twitter.com/vFeed_IO/status/1696840042281373728 · Twitter Post