Use of a Third Party library produced a vulnerability in Barracuda Networks Inc. Barracuda ESG Appliance which allowed Parameter Injection.This issue affected Barracuda ESG Appliance, from 5.1.3.001 through 9.2.1.001, until Barracuda removed the vulnerable logic.
References
Link | Resource |
---|---|
https://www.barracuda.com/company/legal/esg-vulnerability | Vendor Advisory |
https://www.cve.org/CVERecord?id=CVE-2023-7101 | Third Party Advisory |
https://metacpan.org/dist/Spreadsheet-ParseExcel | Product |
https://github.com/haile01/perl_spreadsheet_excel_rce_poc | Third Party Advisory |
https://github.com/jmcnamara/spreadsheet-parseexcel/blob/c7298592e102a375d43150cd002feed806557c15/lib/Spreadsheet/ParseExcel/Utility.pm#L171 | Product |
https://github.com/mandiant/Vulnerability-Disclosures/blob/master/2023/MNDT-2023-0019.md | Third Party Advisory |
Configurations
Configuration 1 (hide)
AND |
|
Configuration 2 (hide)
AND |
|
Configuration 3 (hide)
AND |
|
Configuration 4 (hide)
AND |
|
Configuration 5 (hide)
AND |
|
History
09 Jan 2024, 20:07
Type | Values Removed | Values Added |
---|---|---|
CWE | NVD-CWE-Other | |
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 9.8 |
CPE | cpe:2.3:h:barracuda:email_security_gateway_900:-:*:*:*:*:*:*:* cpe:2.3:o:barracuda:email_security_gateway_800_firmware:*:*:*:*:*:*:*:* cpe:2.3:h:barracuda:email_security_gateway_300:-:*:*:*:*:*:*:* cpe:2.3:h:barracuda:email_security_gateway_600:-:*:*:*:*:*:*:* cpe:2.3:h:barracuda:email_security_gateway_400:-:*:*:*:*:*:*:* cpe:2.3:o:barracuda:email_security_gateway_400_firmware:*:*:*:*:*:*:*:* cpe:2.3:o:barracuda:email_security_gateway_600_firmware:*:*:*:*:*:*:*:* cpe:2.3:o:barracuda:email_security_gateway_900_firmware:*:*:*:*:*:*:*:* cpe:2.3:o:barracuda:email_security_gateway_300_firmware:*:*:*:*:*:*:*:* cpe:2.3:h:barracuda:email_security_gateway_800:-:*:*:*:*:*:*:* |
|
First Time |
Barracuda
Barracuda email Security Gateway 300 Firmware Barracuda email Security Gateway 900 Barracuda email Security Gateway 300 Barracuda email Security Gateway 800 Firmware Barracuda email Security Gateway 400 Barracuda email Security Gateway 600 Firmware Barracuda email Security Gateway 800 Barracuda email Security Gateway 400 Firmware Barracuda email Security Gateway 900 Firmware Barracuda email Security Gateway 600 |
|
References | () https://github.com/jmcnamara/spreadsheet-parseexcel/blob/c7298592e102a375d43150cd002feed806557c15/lib/Spreadsheet/ParseExcel/Utility.pm#L171 - Product | |
References | () https://metacpan.org/dist/Spreadsheet-ParseExcel - Product | |
References | () https://www.cve.org/CVERecord?id=CVE-2023-7101 - Third Party Advisory | |
References | () https://www.barracuda.com/company/legal/esg-vulnerability - Vendor Advisory | |
References | () https://github.com/mandiant/Vulnerability-Disclosures/blob/master/2023/MNDT-2023-0019.md - Third Party Advisory | |
References | () https://github.com/haile01/perl_spreadsheet_excel_rce_poc - Third Party Advisory |
24 Dec 2023, 22:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2023-12-24 22:15
Updated : 2024-01-09 20:07
NVD link : CVE-2023-7102
Mitre link : CVE-2023-7102
JSON object : View
Products Affected
barracuda
- email_security_gateway_600_firmware
- email_security_gateway_300
- email_security_gateway_300_firmware
- email_security_gateway_800
- email_security_gateway_600
- email_security_gateway_900_firmware
- email_security_gateway_400_firmware
- email_security_gateway_900
- email_security_gateway_800_firmware
- email_security_gateway_400
CWE