We use cookies on our website to ensure we provide you with the best experience on our website. By using our website, you agree to the use of cookies for analytics and personalized content.This website uses cookies. More Information
It seems like your browser didn't download the required fonts. Please revise your security settings and try again.
Barracuda Reference / FAQ

BNSEC-02352 XSS-P, Auth vulnerability in the Barracuda Phone System

  • Type: Knowledgebase
  • Date changed: 5 months ago

Solution #00006837

Scope:

Fixed in Barracuda Phone System firmware 3.0.004.012

Severity: High

Description:

Barracuda Phone System was vulnerable to an authenticated persistent XSS attack. Successful exploitation required an attacker to authenticate with the system and then submit a payload into one of the configuration settings. Another user\administrator was required to view\modify the affected setting to trigger the attack. This vulnerability was fixed in the version listed above.

To ensure maximum protection Barracuda Networks recommends that all customers upgrade to the latest generally available firmware and enable all definition updates.

Credits:

Gokmen Guresci

Link to this page:

https://campus.barracuda.com/solution/501600000014370AAA


*** Note that the Barracuda Phone System was formerly known as the Cudatel Communication Server