Latest Barracuda Networks vulnerabilities #

Certain versions of Barracuda Networks Barracuda Message Archiver (BMA) are affected by a reflected Cross-Site Scripting (XSS) N-Day vulnerability. The vulnerability results from the URL error query parameter not being properly sanitized. This allows an adversary to inject malicious JavaScript into the DOM of the login panel. The malicious JavaScript could include a keystroke logger, as demonstrated in the initial disclosure, or leverage other post exploitation tooling like BeEF.

The following versions are affected

  • Barracuda Message Archiver 5.4.2.002

    The extent of the vulnerable versions is currently unknown.

    What is the impact? #

    As seen in the disclosure, a simple keystroke logger may allow an adversary to harvest valid user credentials from keystrokes, pasted strings, or autofilled logins. Successful exploitation of the vulnerability would enable an adversary to gain access to the system by convincing a victim to navigate to a specially crafted URL and enter their credentials.

    Are updates or workarounds available? #

    Users are encouraged to upgrade affected systems to the new versions when a patch is available. Raise user awareness about possible phishing and spear‑phishing campaign involving links to your Barracuda Message Archiver.

    How to find potentially vulnerable systems with runZero #

    From the Service inventory, use the following query to locate potentially vulnerable assets:

    _asset.protocol:http AND protocol:http AND has:last.http.body AND last.http.body:"/css/archiver.css" AND last.http.body:"barracuda_info"

    Written by Matthew Kienow

    Matthew Kienow is a software engineer and security researcher. Matthew previously worked on the Recog recognition framework, AttackerKB as well as Metasploit's MSF 5 APIs. He has also designed, built, and successfully deployed many secure software solutions; however, often he enjoys breaking them instead. He has presented his research at various security conferences including DerbyCon, Hack In Paris, and CarolinaCon. His research has been cited by CSO, Threatpost and SC Magazine.

    More about Matthew Kienow
    Subscribe Now

    Get the latest news and expert insights delivered in your inbox.

    Welcome to the club! Your subscription to our newsletter is successful.

    See Results in Minutes

    See & secure your total attack surface. Even the unknowns & unmanageable.