CVE-2017-14705
https://notcve.org/view.php?id=CVE-2017-14705
DenyAll WAF before 6.4.1 allows unauthenticated remote command execution via TCP port 3001 because shell metacharacters can be inserted into the type parameter to the tailDateFile function in /webservices/stream/tail.php. An iToken authentication parameter is required but can be obtained by exploiting CVE-2017-14706. This affects DenyAll i-Suite LTS 5.5.0 through 5.5.12, i-Suite 5.6, Web Application Firewall 5.7, and Web Application Firewall 6.x before 6.4.1, with On Premises or AWS/Azure cloud deployments. DenyAll WAF en versiones anteriores a la 6.4.1 permite la ejecución remota de comandos sin autenticación mediante el puerto TCP 3001 debido a que los metacaracteres shell se pueden insertar en el parámetro type a la función tailDateFile en /webservices/stream/tail.php. Se necesita un parámetro de autenticación iToken, pero puede obtenerse mediante la explotación de CVE-2017-14706. • https://github.com/rapid7/metasploit-framework/pull/8980 https://pentest.blog/advisory-denyall-web-application-firewall-unauthenticated-remote-code-execution https://www.denyall.com/blog/advisories/advisory-unauthenticated-remote-code-execution-denyall-web-application-firewall • CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') •
CVE-2017-14706
https://notcve.org/view.php?id=CVE-2017-14706
DenyAll WAF before 6.4.1 allows unauthenticated remote attackers to obtain authentication information by making a typeOf=debug request to /webservices/download/index.php, and then reading the iToken field in the reply. This affects DenyAll i-Suite LTS 5.5.0 through 5.5.12, i-Suite 5.6, Web Application Firewall 5.7, and Web Application Firewall 6.x before 6.4.1, with On Premises or AWS/Azure cloud deployments. DenyAll WAF en versiones anteriores a la 6.4.1 permite que los atacantes remotos sin autenticar obtengan información de autenticación realizando una petición typeOf=debug a /webservices/download/index.php y, a continuación, leyendo el campo iToken en la respuesta. Esto afecta a DenyAll i-Suite LTS desde la versión 5.5.0 hasta la 5.5.12, i-Suite 5.6, Web Application Firewall 5.7 y las versiones 6.x de Web Application Firewall anteriores a la 6.4.1 con implementaciones On Premises o en la nube de AWS/Azure. • https://github.com/rapid7/metasploit-framework/pull/8980 https://pentest.blog/advisory-denyall-web-application-firewall-unauthenticated-remote-code-execution https://www.denyall.com/blog/advisories/advisory-unauthenticated-remote-code-execution-denyall-web-application-firewall • CWE-287: Improper Authentication •
CVE-2014-2595 – Barracuda Web Application Firewall - Authentication Bypass
https://notcve.org/view.php?id=CVE-2014-2595
Barracuda Web Application Firewall (WAF) 7.8.1.013 allows remote attackers to bypass authentication by leveraging a permanent authentication token obtained from a query string. Barracuda Web Application Firewall (WAF) versión 7.8.1.013, permite a atacantes remotos omitir la autenticación mediante el aprovechamiento un token de autenticación permanente obtenido desde una cadena de consulta. It is possible to re-use a link which includes a non-expiring authentication token in the query string to gain access to the interface of the Barracuda Web Application Firewall (WAF) firmware version 7.8.1.013. • https://www.exploit-db.com/exploits/39278 http://packetstormsecurity.com/files/127740/Barracuda-WAF-Authentication-Bypass.html http://seclists.org/fulldisclosure/2014/Aug/5 http://www.osvdb.org/109782 https://vulners.com/securityvulns/SECURITYVULNS:DOC:31004 https://www.portcullis-security.com/security-research-and-downloads/security-advisories/cve-2014-2595 https://www.securityfocus.com/bid/69028 • CWE-613: Insufficient Session Expiration •