Barracuda products, confirmed in Spam & Virus Firewall, SSL VPN, and Web Application Firewall versions prior to October 2010, contain a path traversal vulnerability in the view_help.cgi endpoint. The locale parameter fails to properly sanitize user input, allowing attackers to inject traversal sequences and null-byte terminators to access arbitrary files on the underlying system. By exploiting this flaw, unauthenticated remote attackers can retrieve sensitive configuration files such as /mail/snapshot/config.snapshot, potentially exposing credentials, internal settings, and other critical data.
Metrics
Affected Vendors & Products
References
History
Sat, 23 Aug 2025 12:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Barracuda
Barracuda web Application Firewall Barracudanetworks Barracudanetworks barracuda Ssl Vpn Barracudanetworks spam & Virus Firewall 600 |
|
Vendors & Products |
Barracuda
Barracuda web Application Firewall Barracudanetworks Barracudanetworks barracuda Ssl Vpn Barracudanetworks spam & Virus Firewall 600 |
Fri, 22 Aug 2025 14:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Thu, 21 Aug 2025 20:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | Barracuda products, confirmed in Spam & Virus Firewall, SSL VPN, and Web Application Firewall versions prior to October 2010, contain a path traversal vulnerability in the view_help.cgi endpoint. The locale parameter fails to properly sanitize user input, allowing attackers to inject traversal sequences and null-byte terminators to access arbitrary files on the underlying system. By exploiting this flaw, unauthenticated remote attackers can retrieve sensitive configuration files such as /mail/snapshot/config.snapshot, potentially exposing credentials, internal settings, and other critical data. | |
Title | Barracuda Spam & Virus Firewall "locale" Path Traversal | |
Weaknesses | CWE-22 | |
References |
|
|
Metrics |
cvssV4_0
|

Status: PUBLISHED
Assigner: VulnCheck
Published: 2025-08-21T20:09:03.535Z
Updated: 2025-08-22T14:02:46.384Z
Reserved: 2025-08-20T18:00:00.783Z
Link: CVE-2010-20109

Updated: 2025-08-22T14:02:39.692Z

Status : Awaiting Analysis
Published: 2025-08-21T20:15:30.870
Modified: 2025-08-22T18:08:51.663
Link: CVE-2010-20109

No data.