Vulnerability Details : CVE-2023-7102
Use of a Third Party library produced a vulnerability in Barracuda Networks Inc. Barracuda ESG Appliance which allowed Parameter Injection.This issue affected Barracuda ESG Appliance, from 5.1.3.001 through 9.2.1.001, until Barracuda removed the vulnerable logic.
Products affected by CVE-2023-7102
- Barracuda » Email Security Gateway 300 FirmwareVersions from including (>=) 5.1.3.001 and up to, including, (<=) 9.2.1.001cpe:2.3:o:barracuda:email_security_gateway_300_firmware:*:*:*:*:*:*:*:*
- Barracuda » Email Security Gateway 400 FirmwareVersions from including (>=) 5.1.3.001 and up to, including, (<=) 9.2.1.001cpe:2.3:o:barracuda:email_security_gateway_400_firmware:*:*:*:*:*:*:*:*
- Barracuda » Email Security Gateway 600 FirmwareVersions from including (>=) 5.1.3.001 and up to, including, (<=) 9.2.1.001cpe:2.3:o:barracuda:email_security_gateway_600_firmware:*:*:*:*:*:*:*:*
- Barracuda » Email Security Gateway 800 FirmwareVersions from including (>=) 5.1.3.001 and up to, including, (<=) 9.2.1.001cpe:2.3:o:barracuda:email_security_gateway_800_firmware:*:*:*:*:*:*:*:*
- Barracuda » Email Security Gateway 900 FirmwareVersions from including (>=) 5.1.3.001 and up to, including, (<=) 9.2.1.001cpe:2.3:o:barracuda:email_security_gateway_900_firmware:*:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2023-7102
0.21%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 58 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2023-7102
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
9.8
|
CRITICAL | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H |
3.9
|
5.9
|
NIST | 2024-01-09 |
CWE ids for CVE-2023-7102
-
The product relies on third-party components that are not actively supported or maintained by the original developer or a trusted proxy for the original developer.Assigned by: mandiant-cve@google.com (Secondary)
References for CVE-2023-7102
-
https://www.cve.org/CVERecord?id=CVE-2023-7101
CVE Record | CVEThird Party Advisory
-
https://github.com/mandiant/Vulnerability-Disclosures/blob/master/2023/MNDT-2023-0019.md
Vulnerability-Disclosures/2023/MNDT-2023-0019.md at master · mandiant/Vulnerability-Disclosures · GitHubThird Party Advisory
-
https://metacpan.org/dist/Spreadsheet-ParseExcel
Spreadsheet-ParseExcel-0.65 - Read information from an Excel file. - metacpan.orgProduct
-
https://github.com/jmcnamara/spreadsheet-parseexcel/blob/c7298592e102a375d43150cd002feed806557c15/lib/Spreadsheet/ParseExcel/Utility.pm#L171
spreadsheet-parseexcel/lib/Spreadsheet/ParseExcel/Utility.pm at c7298592e102a375d43150cd002feed806557c15 · jmcnamara/spreadsheet-parseexcel · GitHubProduct
-
https://www.barracuda.com/company/legal/esg-vulnerability
Barracuda Email Security Gateway Appliance (ESG) VulnerabilityVendor Advisory
-
https://github.com/haile01/perl_spreadsheet_excel_rce_poc
GitHub - haile01/perl_spreadsheet_excel_rce_poc: POC for RCE vulnerability in ParseExcel library, and ParseXLSX too, as a depending libraryThird Party Advisory
Jump to