Release date:
Updated on:
Affected Systems:
Barracudastore Barracuda CudaTel Communication Server 2.6.002.040
Description:
--------------------------------------------------------------------------------
Barracuda CudaTel Communication Server is an enterprise-class telephone system product.
Barracuda CudaTel Communication Server 2.6.002.040 has multiple security vulnerabilities, which can cause SQL injection and XSS attacks. These vulnerabilities originate from input passed to the GUI routing module through the "bbx_outbound_route_flag_locked" parameter, and input passed to the AJAX-HTML module through the "ops opOpenQueueWallboard" parameter is not properly filtered to return to the user, attackers can execute arbitrary HTML and script code in the context of the user's browser. If the input passed to the cdr module through the "row" and "page" parameters is not properly filtered, it is used in SQL queries, can cause SQL queries.
<* Source: Sebastian Roschke
Link: http://secunia.com/advisories/54258/
*>
Suggestion:
--------------------------------------------------------------------------------
Vendor patch:
Barracudastore
--------------
The vendor has released a patch to fix this security problem. Please download it from the vendor's homepage:
Http://www.barracudastore.com/
Refer:
Http://www.vulnerability-lab.com/download_content.php? Id = 775
Http://www.vulnerability-lab.com/download_content.php? Id = 779