Barracuda products, confirmed in Spam & Virus Firewall, SSL VPN, and Web Application Firewall versions prior to October 2010, contain a path traversal vulnerability in the view_help.cgi endpoint. The locale parameter fails to properly sanitize user input, allowing attackers to inject traversal sequences and null-byte terminators to access arbitrary files on the underlying system. By exploiting this flaw, unauthenticated remote attackers can retrieve sensitive configuration files such as /mail/snapshot/config.snapshot, potentially exposing credentials, internal settings, and other critical data.
History

Sat, 23 Aug 2025 12:00:00 +0000

Type Values Removed Values Added
First Time appeared Barracuda
Barracuda web Application Firewall
Barracudanetworks
Barracudanetworks barracuda Ssl Vpn
Barracudanetworks spam & Virus Firewall 600
Vendors & Products Barracuda
Barracuda web Application Firewall
Barracudanetworks
Barracudanetworks barracuda Ssl Vpn
Barracudanetworks spam & Virus Firewall 600

Fri, 22 Aug 2025 14:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Thu, 21 Aug 2025 20:15:00 +0000

Type Values Removed Values Added
Description Barracuda products, confirmed in Spam & Virus Firewall, SSL VPN, and Web Application Firewall versions prior to October 2010, contain a path traversal vulnerability in the view_help.cgi endpoint. The locale parameter fails to properly sanitize user input, allowing attackers to inject traversal sequences and null-byte terminators to access arbitrary files on the underlying system. By exploiting this flaw, unauthenticated remote attackers can retrieve sensitive configuration files such as /mail/snapshot/config.snapshot, potentially exposing credentials, internal settings, and other critical data.
Title Barracuda Spam & Virus Firewall "locale" Path Traversal
Weaknesses CWE-22
References
Metrics cvssV4_0

{'score': 8.7, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: VulnCheck

Published: 2025-08-21T20:09:03.535Z

Updated: 2025-08-22T14:02:46.384Z

Reserved: 2025-08-20T18:00:00.783Z

Link: CVE-2010-20109

cve-icon Vulnrichment

Updated: 2025-08-22T14:02:39.692Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2025-08-21T20:15:30.870

Modified: 2025-08-22T18:08:51.663

Link: CVE-2010-20109

cve-icon Redhat

No data.