CVE-2010-20109
BaseFortify
Publication date: 2025-08-21
Last updated on: 2025-08-22
Assigner: VulnCheck
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| barracuda | web_application_firewall | * |
| barracuda | ssl_vpn | * |
| barracuda | spam_and_virus_firewall | 4.1.1.021 |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-22 | The product uses external input to construct a pathname that is intended to identify a file or directory that is located underneath a restricted parent directory, but the product does not properly neutralize special elements within the pathname that can cause the pathname to resolve to a location that is outside of the restricted directory. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability is a path traversal flaw in Barracuda products' view_help.cgi endpoint, where the 'locale' parameter does not properly sanitize user input. This allows attackers to inject traversal sequences and null-byte terminators to access arbitrary files on the system without authentication.
How can this vulnerability impact me? :
Exploiting this vulnerability allows unauthenticated remote attackers to retrieve sensitive configuration files, such as /mail/snapshot/config.snapshot, potentially exposing credentials, internal settings, and other critical data, which can lead to unauthorized access and compromise of the system.