A remote command injection vulnerability exists in the Barracuda Email Security Gateway (appliance form factor only) product effecting versions 5.1.3.001-9.2.0.006. The vulnerability arises out of a failure to comprehensively sanitize the processing of .tar file (tape archives). The vulnerability stems from incomplete input validation of a user-supplied .tar file as it pertains to the names of the files contained within the archive. As a consequence, a remote attacker can specifically format these file names in a particular manner that will result in remotely executing a system command through Perl's qx operator with the privileges of the Email Security Gateway product. This issue was fixed as part of BNSF-36456 patch. This patch was automatically applied to all customer appliances.
Published 2023-05-24 19:15:09
Updated 2025-04-02 18:19:24
Source Google Inc.
View at NVD,   CVE.org

Products affected by CVE-2023-2868

CVE-2023-2868 is in the CISA Known Exploited Vulnerabilities Catalog

CISA vulnerability name:
Barracuda Networks ESG Appliance Improper Input Validation Vulnerability
CISA required action:
Apply updates per vendor instructions.
CISA description:
Barracuda Email Security Gateway (ESG) appliance contains an improper input validation vulnerability of a user-supplied .tar file, leading to remote command injection.
Notes:
https://status.barracuda.com/incidents/34kx82j5n4q9; https://nvd.nist.gov/vuln/detail/CVE-2023-2868
Added on 2023-05-26 Action due date 2023-06-16

Exploit prediction scoring system (EPSS) score for CVE-2023-2868

90.10%
Probability of exploitation activity in the next 30 days EPSS Score History
~ 100 %
Percentile, the proportion of vulnerabilities that are scored at or less

CVSS scores for CVE-2023-2868

Base Score Base Severity CVSS Vector Exploitability Score Impact Score Score Source First Seen
9.4
CRITICAL CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:L
3.9
5.5
Google Inc.
9.8
CRITICAL CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
3.9
5.9
NIST

CWE ids for CVE-2023-2868

  • The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.
    Assigned by: cve-coordination@google.com (Secondary)
  • The product constructs all or part of a command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended command when it is sent to a downstream component.
    Assigned by: nvd@nist.gov (Primary)

References for CVE-2023-2868

Jump to
This web site uses cookies for managing your session, storing preferences, website analytics and additional purposes described in our privacy policy.
By using this web site you are agreeing to CVEdetails.com terms of use!